Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe
-
Size
653KB
-
MD5
f461400d378c5f840b7931457c81102e
-
SHA1
ce48c96621003fc34a0d0a2d521d9e9947bf58ed
-
SHA256
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578
-
SHA512
ea87170ab9d7c4e54c678d39c764a5bdad5953b7395eca6a7c6391727e0fc3b842d3bd93135956f32a468678981b03ee305dba852d8aefb28ae93926c19e35f1
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2824-114-0x00000000026D0000-0x00000000026FC000-memory.dmp netwire behavioral2/memory/2824-119-0x00000000026D2BCB-mapping.dmp netwire -
Drops startup file 1 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recover.url 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription pid process target process PID 508 set thread context of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exepid process 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exepid process 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exedescription pid process target process PID 508 wrote to memory of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 508 wrote to memory of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 508 wrote to memory of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 508 wrote to memory of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe PID 508 wrote to memory of 2824 508 797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe"C:\Users\Admin\AppData\Local\Temp\797002f4783a2619b976b112dd695a8b904f9abdbb73dd2505ee5c4b594d0578.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:2824
-