Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-12-2020 10:23
Static task
static1
Behavioral task
behavioral1
Sample
36f108b320d0b177b1fb3e20fb917cb1.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
36f108b320d0b177b1fb3e20fb917cb1.exe
Resource
win10v20201028
General
-
Target
36f108b320d0b177b1fb3e20fb917cb1.exe
-
Size
1.8MB
-
MD5
36f108b320d0b177b1fb3e20fb917cb1
-
SHA1
a3a40037b451c4d25758eec72009e703f1f80534
-
SHA256
ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
-
SHA512
9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/932-5-0x0000000007110000-0x0000000007763000-memory.dmp netwire behavioral1/memory/1236-7-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1236-8-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1236-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/556-21-0x000000000040242D-mapping.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
WindowsDefenderUpdater.exeWindowsDefenderUpdater.exetmpD69.tmp.exepid process 920 WindowsDefenderUpdater.exe 556 WindowsDefenderUpdater.exe 1208 tmpD69.tmp.exe -
Loads dropped DLL 3 IoCs
Processes:
36f108b320d0b177b1fb3e20fb917cb1.exeWindowsDefenderUpdater.exepid process 932 36f108b320d0b177b1fb3e20fb917cb1.exe 920 WindowsDefenderUpdater.exe 920 WindowsDefenderUpdater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
36f108b320d0b177b1fb3e20fb917cb1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater.exe = "C:\\ProgramData\\WindowsDefenderUpdater.exe" 36f108b320d0b177b1fb3e20fb917cb1.exe -
JavaScript code in executable 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tmpD69.tmp.exe js C:\Users\Admin\AppData\Local\Temp\tmpD69.tmp.exe js -
Suspicious use of SetThreadContext 2 IoCs
Processes:
36f108b320d0b177b1fb3e20fb917cb1.exeWindowsDefenderUpdater.exedescription pid process target process PID 932 set thread context of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 920 set thread context of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
36f108b320d0b177b1fb3e20fb917cb1.exeWindowsDefenderUpdater.exedescription pid process target process PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 1236 932 36f108b320d0b177b1fb3e20fb917cb1.exe 36f108b320d0b177b1fb3e20fb917cb1.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 932 wrote to memory of 920 932 36f108b320d0b177b1fb3e20fb917cb1.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 556 920 WindowsDefenderUpdater.exe WindowsDefenderUpdater.exe PID 920 wrote to memory of 1208 920 WindowsDefenderUpdater.exe tmpD69.tmp.exe PID 920 wrote to memory of 1208 920 WindowsDefenderUpdater.exe tmpD69.tmp.exe PID 920 wrote to memory of 1208 920 WindowsDefenderUpdater.exe tmpD69.tmp.exe PID 920 wrote to memory of 1208 920 WindowsDefenderUpdater.exe tmpD69.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"2⤵
-
C:\ProgramData\WindowsDefenderUpdater.exe"C:\ProgramData\WindowsDefenderUpdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\WindowsDefenderUpdater.exe"C:\ProgramData\WindowsDefenderUpdater.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\tmpD69.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD69.tmp.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsDefenderUpdater.exeMD5
36f108b320d0b177b1fb3e20fb917cb1
SHA1a3a40037b451c4d25758eec72009e703f1f80534
SHA256ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
SHA5129e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
-
C:\ProgramData\WindowsDefenderUpdater.exeMD5
36f108b320d0b177b1fb3e20fb917cb1
SHA1a3a40037b451c4d25758eec72009e703f1f80534
SHA256ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
SHA5129e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
-
C:\ProgramData\WindowsDefenderUpdater.exeMD5
36f108b320d0b177b1fb3e20fb917cb1
SHA1a3a40037b451c4d25758eec72009e703f1f80534
SHA256ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
SHA5129e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
-
C:\Users\Admin\AppData\Local\Temp\tmpD69.tmp.exeMD5
2e0385c717b435d1614c025465325343
SHA1868299f19bf85a53586f29532680143b250ced96
SHA25645efc02dded7360d03dd32e16ab04a06ced012605f85ef187e63357c89cb6d61
SHA5121b84e45aefed2abc921f61da93fd65b9971bb38b0b54b5793271c1150ecabfa9ec7afa4dce1622e2c5f67cf7b76e40c5a008694b267190f2d693f0a1b3333e98
-
\ProgramData\WindowsDefenderUpdater.exeMD5
36f108b320d0b177b1fb3e20fb917cb1
SHA1a3a40037b451c4d25758eec72009e703f1f80534
SHA256ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
SHA5129e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
-
\ProgramData\WindowsDefenderUpdater.exeMD5
36f108b320d0b177b1fb3e20fb917cb1
SHA1a3a40037b451c4d25758eec72009e703f1f80534
SHA256ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa
SHA5129e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62
-
\Users\Admin\AppData\Local\Temp\tmpD69.tmp.exeMD5
2e0385c717b435d1614c025465325343
SHA1868299f19bf85a53586f29532680143b250ced96
SHA25645efc02dded7360d03dd32e16ab04a06ced012605f85ef187e63357c89cb6d61
SHA5121b84e45aefed2abc921f61da93fd65b9971bb38b0b54b5793271c1150ecabfa9ec7afa4dce1622e2c5f67cf7b76e40c5a008694b267190f2d693f0a1b3333e98
-
memory/556-21-0x000000000040242D-mapping.dmp
-
memory/920-15-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/920-11-0x0000000000000000-mapping.dmp
-
memory/920-14-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/932-2-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/932-6-0x00000000002F0000-0x000000000030D000-memory.dmpFilesize
116KB
-
memory/932-5-0x0000000007110000-0x0000000007763000-memory.dmpFilesize
6.3MB
-
memory/932-3-0x0000000001130000-0x0000000001131000-memory.dmpFilesize
4KB
-
memory/1208-25-0x0000000000000000-mapping.dmp
-
memory/1236-9-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1236-8-0x000000000040242D-mapping.dmp
-
memory/1236-7-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB