Analysis

  • max time kernel
    118s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-12-2020 23:30

General

  • Target

    X2.exe

  • Size

    1.8MB

  • MD5

    36f108b320d0b177b1fb3e20fb917cb1

  • SHA1

    a3a40037b451c4d25758eec72009e703f1f80534

  • SHA256

    ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

  • SHA512

    9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

Malware Config

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\X2.exe
    "C:\Users\Admin\AppData\Local\Temp\X2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Users\Admin\AppData\Local\Temp\X2.exe
      "C:\Users\Admin\AppData\Local\Temp\X2.exe"
      2⤵
        PID:2388
      • C:\ProgramData\WindowsDefenderUpdater.exe
        "C:\ProgramData\WindowsDefenderUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:636
        • C:\ProgramData\WindowsDefenderUpdater.exe
          "C:\ProgramData\WindowsDefenderUpdater.exe"
          3⤵
          • Executes dropped EXE
          PID:2112
        • C:\Users\Admin\AppData\Local\Temp\tmp8A8D.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp8A8D.tmp.exe"
          3⤵
          • Executes dropped EXE
          PID:3892

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\Users\Admin\AppData\Local\Temp\tmp8A8D.tmp.exe
      MD5

      2e0385c717b435d1614c025465325343

      SHA1

      868299f19bf85a53586f29532680143b250ced96

      SHA256

      45efc02dded7360d03dd32e16ab04a06ced012605f85ef187e63357c89cb6d61

      SHA512

      1b84e45aefed2abc921f61da93fd65b9971bb38b0b54b5793271c1150ecabfa9ec7afa4dce1622e2c5f67cf7b76e40c5a008694b267190f2d693f0a1b3333e98

    • memory/636-26-0x0000000007AF0000-0x0000000007AF1000-memory.dmp
      Filesize

      4KB

    • memory/636-16-0x0000000000180000-0x0000000000181000-memory.dmp
      Filesize

      4KB

    • memory/636-15-0x0000000073E00000-0x00000000744EE000-memory.dmp
      Filesize

      6.9MB

    • memory/636-12-0x0000000000000000-mapping.dmp
    • memory/648-7-0x0000000008300000-0x0000000008301000-memory.dmp
      Filesize

      4KB

    • memory/648-8-0x00000000088A0000-0x00000000088A1000-memory.dmp
      Filesize

      4KB

    • memory/648-2-0x0000000073E00000-0x00000000744EE000-memory.dmp
      Filesize

      6.9MB

    • memory/648-6-0x0000000002F50000-0x0000000002F6D000-memory.dmp
      Filesize

      116KB

    • memory/648-5-0x0000000007B00000-0x0000000008153000-memory.dmp
      Filesize

      6.3MB

    • memory/648-3-0x0000000000A70000-0x0000000000A71000-memory.dmp
      Filesize

      4KB

    • memory/2112-23-0x000000000040242D-mapping.dmp
    • memory/2388-11-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/2388-10-0x000000000040242D-mapping.dmp
    • memory/2388-9-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB