Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-12-2020 10:23

General

  • Target

    36f108b320d0b177b1fb3e20fb917cb1.exe

  • Size

    1.8MB

  • MD5

    36f108b320d0b177b1fb3e20fb917cb1

  • SHA1

    a3a40037b451c4d25758eec72009e703f1f80534

  • SHA256

    ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

  • SHA512

    9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

Malware Config

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe
      "C:\Users\Admin\AppData\Local\Temp\36f108b320d0b177b1fb3e20fb917cb1.exe"
      2⤵
        PID:1308
      • C:\ProgramData\WindowsDefenderUpdater.exe
        "C:\ProgramData\WindowsDefenderUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\ProgramData\WindowsDefenderUpdater.exe
          "C:\ProgramData\WindowsDefenderUpdater.exe"
          3⤵
          • Executes dropped EXE
          PID:3200
        • C:\Users\Admin\AppData\Local\Temp\tmp4036.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp4036.tmp.exe"
          3⤵
          • Executes dropped EXE
          PID:4040

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\ProgramData\WindowsDefenderUpdater.exe
      MD5

      36f108b320d0b177b1fb3e20fb917cb1

      SHA1

      a3a40037b451c4d25758eec72009e703f1f80534

      SHA256

      ac5172fa3b434962c4f2e12b9c47dfd29a939b1d15c358ead485c4843ae065aa

      SHA512

      9e97b0984a711244e5783dd772490a12858557a4c4dc677f5f1189e92d4232db48e5e56471fd0af3e78b2cd801ac34df4b71bceba84d26fe76e3b15ae109bd62

    • C:\Users\Admin\AppData\Local\Temp\tmp4036.tmp.exe
      MD5

      2e0385c717b435d1614c025465325343

      SHA1

      868299f19bf85a53586f29532680143b250ced96

      SHA256

      45efc02dded7360d03dd32e16ab04a06ced012605f85ef187e63357c89cb6d61

      SHA512

      1b84e45aefed2abc921f61da93fd65b9971bb38b0b54b5793271c1150ecabfa9ec7afa4dce1622e2c5f67cf7b76e40c5a008694b267190f2d693f0a1b3333e98

    • memory/1308-10-0x000000000040242D-mapping.dmp
    • memory/1308-11-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1308-9-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/2604-7-0x00000000082C0000-0x00000000082C1000-memory.dmp
      Filesize

      4KB

    • memory/2604-8-0x0000000008860000-0x0000000008861000-memory.dmp
      Filesize

      4KB

    • memory/2604-2-0x0000000073940000-0x000000007402E000-memory.dmp
      Filesize

      6.9MB

    • memory/2604-6-0x0000000003060000-0x000000000307D000-memory.dmp
      Filesize

      116KB

    • memory/2604-5-0x0000000007AC0000-0x0000000008113000-memory.dmp
      Filesize

      6.3MB

    • memory/2604-3-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/3200-23-0x000000000040242D-mapping.dmp
    • memory/3676-12-0x0000000000000000-mapping.dmp
    • memory/3676-15-0x0000000073940000-0x000000007402E000-memory.dmp
      Filesize

      6.9MB

    • memory/3676-16-0x0000000000A00000-0x0000000000A01000-memory.dmp
      Filesize

      4KB

    • memory/3676-26-0x00000000084C0000-0x00000000084C1000-memory.dmp
      Filesize

      4KB