Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-03-2021 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Begantoda[1].exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Begantoda[1].exe
-
Size
586KB
-
MD5
b4ff2825679835badd44aaa15256638c
-
SHA1
f67f7fac7368250b8df4d0a9b05408f775fe5f9c
-
SHA256
691f3e4b532cb3802630762dadc0eb5f894a6b5463ab5723ef67379ef3f9d31f
-
SHA512
33339d4ca2687a802ae61679bba672f926020fb319794e84bbdc84c3e68c744b8e241784f2ae5daa08ac78f58ca570539cd1ba446ec3ee4315c032937369db5a
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-18-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/2836-19-0x000000000040242D-mapping.dmp netwire behavioral2/memory/2836-24-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Begantoda[1].exedescription pid process target process PID 828 set thread context of 2836 828 Begantoda[1].exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
pOwERsHeLl.exepid process 3364 pOwERsHeLl.exe 3364 pOwERsHeLl.exe 3364 pOwERsHeLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
pOwERsHeLl.exedescription pid process Token: SeDebugPrivilege 3364 pOwERsHeLl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Begantoda[1].exedescription pid process target process PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 2836 828 Begantoda[1].exe RegAsm.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe PID 828 wrote to memory of 3364 828 Begantoda[1].exe pOwERsHeLl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe"C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pOwERsHeLl.exe"pOwERsHeLl.exe" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Begantoda[1].exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trevorrendo.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/828-2-0x0000000073BB0000-0x000000007429E000-memory.dmpFilesize
6.9MB
-
memory/828-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/828-5-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/828-6-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/828-7-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/828-8-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/828-9-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/828-10-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/828-11-0x0000000004D63000-0x0000000004D65000-memory.dmpFilesize
8KB
-
memory/828-12-0x0000000004D65000-0x0000000004D66000-memory.dmpFilesize
4KB
-
memory/828-13-0x0000000004D66000-0x0000000004D67000-memory.dmpFilesize
4KB
-
memory/828-14-0x0000000004D67000-0x0000000004D68000-memory.dmpFilesize
4KB
-
memory/828-15-0x0000000004D68000-0x0000000004D69000-memory.dmpFilesize
4KB
-
memory/828-16-0x0000000004D69000-0x0000000004D6F000-memory.dmpFilesize
24KB
-
memory/828-17-0x0000000005010000-0x000000000501C000-memory.dmpFilesize
48KB
-
memory/2836-19-0x000000000040242D-mapping.dmp
-
memory/2836-24-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2836-18-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3364-27-0x0000000006EA0000-0x0000000006EA1000-memory.dmpFilesize
4KB
-
memory/3364-30-0x00000000079F0000-0x00000000079F1000-memory.dmpFilesize
4KB
-
memory/3364-23-0x0000000007050000-0x0000000007051000-memory.dmpFilesize
4KB
-
memory/3364-21-0x0000000073BB0000-0x000000007429E000-memory.dmpFilesize
6.9MB
-
memory/3364-25-0x0000000004660000-0x0000000004661000-memory.dmpFilesize
4KB
-
memory/3364-26-0x0000000004662000-0x0000000004663000-memory.dmpFilesize
4KB
-
memory/3364-20-0x0000000000000000-mapping.dmp
-
memory/3364-28-0x0000000007680000-0x0000000007681000-memory.dmpFilesize
4KB
-
memory/3364-29-0x00000000076F0000-0x00000000076F1000-memory.dmpFilesize
4KB
-
memory/3364-22-0x0000000004530000-0x0000000004531000-memory.dmpFilesize
4KB
-
memory/3364-31-0x00000000077C0000-0x00000000077C1000-memory.dmpFilesize
4KB
-
memory/3364-32-0x0000000007D80000-0x0000000007D81000-memory.dmpFilesize
4KB
-
memory/3364-33-0x00000000080A0000-0x00000000080A1000-memory.dmpFilesize
4KB
-
memory/3364-34-0x0000000008D90000-0x0000000008D91000-memory.dmpFilesize
4KB
-
memory/3364-35-0x0000000008D30000-0x0000000008D31000-memory.dmpFilesize
4KB
-
memory/3364-36-0x0000000008E40000-0x0000000008E41000-memory.dmpFilesize
4KB
-
memory/3364-38-0x0000000004663000-0x0000000004664000-memory.dmpFilesize
4KB