Analysis
-
max time kernel
100s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 12:38
Behavioral task
behavioral1
Sample
dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe
Resource
win7-20220414-en
General
-
Target
dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe
-
Size
160KB
-
MD5
69860cba0802c7c6e8fe50f377dd76bd
-
SHA1
8b35d536568a2b32fbea88936d49739b7e485c9a
-
SHA256
dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd
-
SHA512
935330f456923a9480de6f0efebc6aa46fc9fc7cf728115991e3ffd69aaea8147029a78b922f47f78b008068f38ad33d5448b747d855017420f37ce09cfd2a8e
Malware Config
Extracted
netwire
216.170.126.139:4660
-
activex_autorun
false
- activex_key
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
- startup_name
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Host.exe netwire \Users\Admin\AppData\Roaming\Install\Host.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1456 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exepid process 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exedescription pid process target process PID 632 wrote to memory of 1456 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe Host.exe PID 632 wrote to memory of 1456 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe Host.exe PID 632 wrote to memory of 1456 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe Host.exe PID 632 wrote to memory of 1456 632 dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe"C:\Users\Admin\AppData\Local\Temp\dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
160KB
MD569860cba0802c7c6e8fe50f377dd76bd
SHA18b35d536568a2b32fbea88936d49739b7e485c9a
SHA256dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd
SHA512935330f456923a9480de6f0efebc6aa46fc9fc7cf728115991e3ffd69aaea8147029a78b922f47f78b008068f38ad33d5448b747d855017420f37ce09cfd2a8e
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
160KB
MD569860cba0802c7c6e8fe50f377dd76bd
SHA18b35d536568a2b32fbea88936d49739b7e485c9a
SHA256dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd
SHA512935330f456923a9480de6f0efebc6aa46fc9fc7cf728115991e3ffd69aaea8147029a78b922f47f78b008068f38ad33d5448b747d855017420f37ce09cfd2a8e
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
160KB
MD569860cba0802c7c6e8fe50f377dd76bd
SHA18b35d536568a2b32fbea88936d49739b7e485c9a
SHA256dc13ae27d3eedec944dfd581544303f835313307c86a08a9292d1f60d8489fdd
SHA512935330f456923a9480de6f0efebc6aa46fc9fc7cf728115991e3ffd69aaea8147029a78b922f47f78b008068f38ad33d5448b747d855017420f37ce09cfd2a8e
-
memory/632-54-0x0000000075391000-0x0000000075393000-memory.dmpFilesize
8KB
-
memory/1456-57-0x0000000000000000-mapping.dmp