Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 08:02
Static task
static1
Behavioral task
behavioral1
Sample
order.exe
Resource
win7v20210410
General
-
Target
order.exe
-
Size
838KB
-
MD5
587f6655380282c9fb7997fa2225438e
-
SHA1
5b45eb58ef1d1cd93df0ecfc7b4124644515e93c
-
SHA256
9add495b9373ca17ea4f158da84a200f3d5a52ce81bc535a575a5eac31bd76bb
-
SHA512
1b97c465d355d8fa6355c7b856ba7eebac8b8c4bdd9c482b1a8fa6c558309356cfb80ac3373737b269c1ca9c4df03294daee918a34500e45874c1b6fc32ce488
Malware Config
Extracted
netwire
84.38.129.130:19891
-
activex_autorun
false
- activex_key
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iFwvrEFs
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
- startup_name
-
use_mutex
true
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1560-126-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1560-127-0x000000000040242D-mapping.dmp netwire behavioral2/memory/1560-128-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/904-139-0x0000000005690000-0x0000000005722000-memory.dmp netwire behavioral2/memory/3776-146-0x000000000040242D-mapping.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
Host.exeHost.exeHost.exepid process 904 Host.exe 1844 Host.exe 3776 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
order.exeHost.exedescription pid process target process PID 804 set thread context of 1560 804 order.exe order.exe PID 904 set thread context of 3776 904 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2776 schtasks.exe 3800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
order.exeHost.exepid process 804 order.exe 904 Host.exe 904 Host.exe 904 Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
order.exeHost.exedescription pid process Token: SeDebugPrivilege 804 order.exe Token: SeDebugPrivilege 904 Host.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
order.exeorder.exeHost.exedescription pid process target process PID 804 wrote to memory of 2776 804 order.exe schtasks.exe PID 804 wrote to memory of 2776 804 order.exe schtasks.exe PID 804 wrote to memory of 2776 804 order.exe schtasks.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 804 wrote to memory of 1560 804 order.exe order.exe PID 1560 wrote to memory of 904 1560 order.exe Host.exe PID 1560 wrote to memory of 904 1560 order.exe Host.exe PID 1560 wrote to memory of 904 1560 order.exe Host.exe PID 904 wrote to memory of 3800 904 Host.exe schtasks.exe PID 904 wrote to memory of 3800 904 Host.exe schtasks.exe PID 904 wrote to memory of 3800 904 Host.exe schtasks.exe PID 904 wrote to memory of 1844 904 Host.exe Host.exe PID 904 wrote to memory of 1844 904 Host.exe Host.exe PID 904 wrote to memory of 1844 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe PID 904 wrote to memory of 3776 904 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BFzyfsQWtX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3038.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\order.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BFzyfsQWtX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF07B.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3038.tmpMD5
8f4b327e97258a599564cd2ad518ac56
SHA13a72b232fce4b3d80ce27175408ae70d5cf6d1e7
SHA256112517429d8cf336b27742478319bf3bfd4cc4ff141a60982bb7fbe09c7667a3
SHA512fc152ba8d86fd274b1fbd117a9efe8971e1e9ebf75a2d3a6fef1adb86b8d12f67d9c6051d02771121bc01daf985cbd3261c53602bbc52791ca5c1ad0f5c42823
-
C:\Users\Admin\AppData\Local\Temp\tmpF07B.tmpMD5
8f4b327e97258a599564cd2ad518ac56
SHA13a72b232fce4b3d80ce27175408ae70d5cf6d1e7
SHA256112517429d8cf336b27742478319bf3bfd4cc4ff141a60982bb7fbe09c7667a3
SHA512fc152ba8d86fd274b1fbd117a9efe8971e1e9ebf75a2d3a6fef1adb86b8d12f67d9c6051d02771121bc01daf985cbd3261c53602bbc52791ca5c1ad0f5c42823
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeMD5
587f6655380282c9fb7997fa2225438e
SHA15b45eb58ef1d1cd93df0ecfc7b4124644515e93c
SHA2569add495b9373ca17ea4f158da84a200f3d5a52ce81bc535a575a5eac31bd76bb
SHA5121b97c465d355d8fa6355c7b856ba7eebac8b8c4bdd9c482b1a8fa6c558309356cfb80ac3373737b269c1ca9c4df03294daee918a34500e45874c1b6fc32ce488
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeMD5
587f6655380282c9fb7997fa2225438e
SHA15b45eb58ef1d1cd93df0ecfc7b4124644515e93c
SHA2569add495b9373ca17ea4f158da84a200f3d5a52ce81bc535a575a5eac31bd76bb
SHA5121b97c465d355d8fa6355c7b856ba7eebac8b8c4bdd9c482b1a8fa6c558309356cfb80ac3373737b269c1ca9c4df03294daee918a34500e45874c1b6fc32ce488
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeMD5
587f6655380282c9fb7997fa2225438e
SHA15b45eb58ef1d1cd93df0ecfc7b4124644515e93c
SHA2569add495b9373ca17ea4f158da84a200f3d5a52ce81bc535a575a5eac31bd76bb
SHA5121b97c465d355d8fa6355c7b856ba7eebac8b8c4bdd9c482b1a8fa6c558309356cfb80ac3373737b269c1ca9c4df03294daee918a34500e45874c1b6fc32ce488
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeMD5
587f6655380282c9fb7997fa2225438e
SHA15b45eb58ef1d1cd93df0ecfc7b4124644515e93c
SHA2569add495b9373ca17ea4f158da84a200f3d5a52ce81bc535a575a5eac31bd76bb
SHA5121b97c465d355d8fa6355c7b856ba7eebac8b8c4bdd9c482b1a8fa6c558309356cfb80ac3373737b269c1ca9c4df03294daee918a34500e45874c1b6fc32ce488
-
memory/804-121-0x0000000008760000-0x0000000008761000-memory.dmpFilesize
4KB
-
memory/804-122-0x0000000006DE0000-0x0000000006E93000-memory.dmpFilesize
716KB
-
memory/804-123-0x000000000B230000-0x000000000B29F000-memory.dmpFilesize
444KB
-
memory/804-117-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/804-120-0x0000000005790000-0x0000000005792000-memory.dmpFilesize
8KB
-
memory/804-116-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/804-118-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/804-114-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/804-119-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/904-139-0x0000000005690000-0x0000000005722000-memory.dmpFilesize
584KB
-
memory/904-129-0x0000000000000000-mapping.dmp
-
memory/1560-128-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1560-127-0x000000000040242D-mapping.dmp
-
memory/1560-126-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2776-124-0x0000000000000000-mapping.dmp
-
memory/3776-146-0x000000000040242D-mapping.dmp
-
memory/3800-142-0x0000000000000000-mapping.dmp