Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe
-
Size
653KB
-
MD5
f461400d378c5f840b7931457c81102e
-
SHA1
ce48c96621003fc34a0d0a2d521d9e9947bf58ed
-
SHA256
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578
-
SHA512
ea87170ab9d7c4e54c678d39c764a5bdad5953b7395eca6a7c6391727e0fc3b842d3bd93135956f32a468678981b03ee305dba852d8aefb28ae93926c19e35f1
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-61-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1636-66-0x0000000000402BCB-mapping.dmp netwire -
Drops startup file 1 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recover.url 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription pid process target process PID 1084 set thread context of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exepid process 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exepid process 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription pid process target process PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 1084 wrote to memory of 1636 1084 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe"C:\Users\Admin\AppData\Local\Temp\797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:1636
-