Analysis

  • max time kernel
    3s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-03-2021 07:17

General

  • Target

    FedEx Shipment.exe

  • Size

    738KB

  • MD5

    20e5be824638df2b4f86520d5a5a0cad

  • SHA1

    5e3a464ce7ebaf297438e52dd6c9eaf374217eed

  • SHA256

    cef2f777b4c29a5ced187382e3c0a0ee61d4c71471fc5d100b78a4e88f4324de

  • SHA512

    238b8f441a6d5c17c407ff254928bb17ef7ed06143a23187842f9ab3012263913055672ea67c32351f2be9d2b2fa6f7e0a2a7af2260514870418dcf19fc11a11

Malware Config

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FedEx Shipment.exe
    "C:\Users\Admin\AppData\Local\Temp\FedEx Shipment.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
        PID:1724

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1724-10-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1724-12-0x000000000040242D-mapping.dmp
    • memory/1724-13-0x00000000750C1000-0x00000000750C3000-memory.dmp
      Filesize

      8KB

    • memory/1724-14-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1932-2-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
      Filesize

      9.9MB

    • memory/1932-3-0x000000013FC60000-0x000000013FC61000-memory.dmp
      Filesize

      4KB

    • memory/1932-5-0x0000000002150000-0x00000000021CE000-memory.dmp
      Filesize

      504KB

    • memory/1932-6-0x000000001B170000-0x000000001B1EE000-memory.dmp
      Filesize

      504KB

    • memory/1932-7-0x0000000000860000-0x0000000000872000-memory.dmp
      Filesize

      72KB

    • memory/1932-8-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/1932-9-0x00000000021D0000-0x00000000021F9000-memory.dmp
      Filesize

      164KB

    • memory/1932-11-0x000000001B980000-0x000000001B982000-memory.dmp
      Filesize

      8KB