Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-03-2021 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Begantoda[1].exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Begantoda[1].exe
-
Size
586KB
-
MD5
b4ff2825679835badd44aaa15256638c
-
SHA1
f67f7fac7368250b8df4d0a9b05408f775fe5f9c
-
SHA256
691f3e4b532cb3802630762dadc0eb5f894a6b5463ab5723ef67379ef3f9d31f
-
SHA512
33339d4ca2687a802ae61679bba672f926020fb319794e84bbdc84c3e68c744b8e241784f2ae5daa08ac78f58ca570539cd1ba446ec3ee4315c032937369db5a
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-18-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/2836-19-0x000000000040242D-mapping.dmp netwire behavioral2/memory/2836-24-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Begantoda[1].exedescription pid process target process PID 828 set thread context of 2836 828 Begantoda[1].exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
pOwERsHeLl.exepid process 3364 pOwERsHeLl.exe 3364 pOwERsHeLl.exe 3364 pOwERsHeLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
pOwERsHeLl.exedescription pid process Token: SeDebugPrivilege 3364 pOwERsHeLl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Begantoda[1].exedescription pid process target process PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe"C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pOwERsHeLl.exe"pOwERsHeLl.exe" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trevorrendo.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-