Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 13:05

General

  • Target

    DHL_RECE.exe

  • Size

    381KB

  • MD5

    a003c2bb955b2caab13a30f8e8827f09

  • SHA1

    0a716bed3e668c0276910851465adb4fde6c0a49

  • SHA256

    2936937ebeead6d1c9b62739331fd975248e2998fcf13c94ee817bbfe501a64b

  • SHA512

    8e57ae74646718ca9ca60977daf132108f130dcc68771014e81cb38502f1f26335fcc251eaea5fafcdf3a55ba5f71758f86e24d44f349d31f7022acbcd7e232b

Malware Config

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Blocklisted process makes network request 64 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL_RECE.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL_RECE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe KnowhowMove,Xylol
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        PID:1128

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Counterfoil
    Filesize

    202KB

    MD5

    7b15f5cea41c54e4b02255452673c114

    SHA1

    92a999c9dfe29ad8c19b705f5a30c25164784249

    SHA256

    b8ea5fcb8f5515a72d04775697eb8d838a5e6c2caa444ad679ae6154a0b7702c

    SHA512

    0614f136102d27e046ed95e52b91a7e379a641e2724292346b7640a045accb6afe423f13cd857dcfe231ed2a0945b89a4f6a8be9d7eb679a30591054c027f4cc

  • C:\Users\Admin\AppData\Local\Temp\KnowhowMove.DLL
    Filesize

    72KB

    MD5

    11d85e62b99dbf03d47ac93ee60b6915

    SHA1

    97eb6906ee2026e923165e85f0ba64d100fe6532

    SHA256

    5c2048e13ad410ed7df298b7626ec1ddd9d0e428e3bb3f869e22713f821a10b8

    SHA512

    36940a2ac3a62c6247f3cd20a2db6400e0ee619e762135ac52cd9df6d2df81a5dac0311d078b2febdaad8dddb2efad03bd39d1e1aceb30750382c2d81e5925f1

  • \Users\Admin\AppData\Local\Temp\KnowhowMove.dll
    Filesize

    72KB

    MD5

    11d85e62b99dbf03d47ac93ee60b6915

    SHA1

    97eb6906ee2026e923165e85f0ba64d100fe6532

    SHA256

    5c2048e13ad410ed7df298b7626ec1ddd9d0e428e3bb3f869e22713f821a10b8

    SHA512

    36940a2ac3a62c6247f3cd20a2db6400e0ee619e762135ac52cd9df6d2df81a5dac0311d078b2febdaad8dddb2efad03bd39d1e1aceb30750382c2d81e5925f1

  • memory/1128-64-0x0000000000000000-mapping.dmp
  • memory/1128-66-0x00000000774C0000-0x0000000077669000-memory.dmp
    Filesize

    1.7MB

  • memory/1128-67-0x0000000000090000-0x0000000000096000-memory.dmp
    Filesize

    24KB

  • memory/1128-72-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1300-55-0x0000000000000000-mapping.dmp
  • memory/1300-60-0x0000000074860000-0x00000000748B8000-memory.dmp
    Filesize

    352KB

  • memory/1300-62-0x0000000075E20000-0x0000000075E55000-memory.dmp
    Filesize

    212KB

  • memory/1300-63-0x00000000774C0000-0x0000000077669000-memory.dmp
    Filesize

    1.7MB

  • memory/1984-54-0x00000000764C1000-0x00000000764C3000-memory.dmp
    Filesize

    8KB