Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    04-05-2021 13:19

General

  • Target

    f3ad47ca842225f405e277f5f2b0521266fe65a90bf746ac39a67990835ddf14.bin.exe

  • Size

    753KB

  • MD5

    abb973cc735baa96deac84f5653fd89a

  • SHA1

    59c52bab6062e461866be8b918a376e4362571e1

  • SHA256

    f3ad47ca842225f405e277f5f2b0521266fe65a90bf746ac39a67990835ddf14

  • SHA512

    b44074cc3a0b114e3580c2222c29782d42c814ab365731a97c3f76bbc62206a6cd59a12f86d16aeeb8004c84d5ad871bf2b058d291dfb66cf2fd138e0159b59b

Malware Config

Signatures

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3ad47ca842225f405e277f5f2b0521266fe65a90bf746ac39a67990835ddf14.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\f3ad47ca842225f405e277f5f2b0521266fe65a90bf746ac39a67990835ddf14.bin.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Windows\SysWOW64\logagent.exe
      C:\Windows\System32\logagent.exe
      2⤵
        PID:2628

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2628-115-0x0000000000000000-mapping.dmp
    • memory/2628-117-0x0000000002960000-0x0000000002961000-memory.dmp
      Filesize

      4KB

    • memory/2628-116-0x0000000002C50000-0x0000000002C51000-memory.dmp
      Filesize

      4KB

    • memory/2628-119-0x0000000002CB0000-0x0000000002CB1000-memory.dmp
      Filesize

      4KB

    • memory/2628-121-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/2628-120-0x0000000010550000-0x0000000010586000-memory.dmp
      Filesize

      216KB

    • memory/3724-114-0x00000000005B0000-0x00000000005B1000-memory.dmp
      Filesize

      4KB