Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 06:31

General

  • Target

    property.exe

  • Size

    715KB

  • MD5

    a7ce2f883660a89695ae17ce9c60a7dc

  • SHA1

    d1d38d629f7d86d854efef65eb81635e4ab5d9f0

  • SHA256

    0ad637fd2f6be43b412315027c0e2636329b7da0f51a40e80e9ad8c76558bb6b

  • SHA512

    b4158764b854f291e83bd47938b64e69029e63dc2f7bb96fc7ae11f3d9895109193e9ee0a2b2aee7d6d0b4022a38d2560cab4393609b58734326971cbd915031

Malware Config

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\property.exe
    "C:\Users\Admin\AppData\Local\Temp\property.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\property.exe
      "C:\Users\Admin\AppData\Local\Temp\property.exe"
      2⤵
        PID:1896

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1896-2-0x000000000040242D-mapping.dmp
    • memory/1896-3-0x0000000075571000-0x0000000075573000-memory.dmp
      Filesize

      8KB

    • memory/1896-4-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB