Analysis

  • max time kernel
    125s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 12:03

General

  • Target

    b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe

  • Size

    618KB

  • MD5

    8c55cba01db3ea37db03917b97c49b2f

  • SHA1

    e86a93f9b85527e330a2c03e01d243ce38231c09

  • SHA256

    b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd

  • SHA512

    801c578d0a5910210c16143aa1f7911a228d8f17c301773316c36b1ea42bbc9ef0c5b70cc363bcdf4df837f701f55fd23602c3fd025d70462912a6d871420efd

Malware Config

Extracted

Family

netwire

C2

fdghfghdfghjhgjkgfgjh234569.ru:6974

Attributes
  • activex_autorun

    false

  • activex_key

  • copy_executable

    false

  • delete_original

    false

  • host_id

    a2nw

  • install_path

  • keylogger_dir

  • lock_executable

    false

  • mutex

    NrPiWfVe

  • offline_keylogger

    false

  • password

    rdfs34df32sdf

  • registry_autorun

    false

  • startup_name

  • use_mutex

    true

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe
    "C:\Users\Admin\AppData\Local\Temp\b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:3176
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:4176
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd.exe" "C:\Users\Admin\AppData\Local\sdvbcxs.exe"
      2⤵
      • NTFS ADS
      PID:1288
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\sdvbcxs.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\sdvbcxs.exe
        "C:\Users\Admin\AppData\Local\sdvbcxs.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\sdvbcxs.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:4820
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\sdvbcxs.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3000
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
            PID:4984
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\system32\svchost.exe"
            4⤵
              PID:1036
            • C:\Windows\SysWOW64\svchost.exe
              "C:\Windows\system32\svchost.exe"
              4⤵
                PID:3676

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\sdvbcxs.exe
          Filesize

          618KB

          MD5

          8c55cba01db3ea37db03917b97c49b2f

          SHA1

          e86a93f9b85527e330a2c03e01d243ce38231c09

          SHA256

          b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd

          SHA512

          801c578d0a5910210c16143aa1f7911a228d8f17c301773316c36b1ea42bbc9ef0c5b70cc363bcdf4df837f701f55fd23602c3fd025d70462912a6d871420efd

        • C:\Users\Admin\AppData\Local\sdvbcxs.exe
          Filesize

          618KB

          MD5

          8c55cba01db3ea37db03917b97c49b2f

          SHA1

          e86a93f9b85527e330a2c03e01d243ce38231c09

          SHA256

          b4342b4b5f8e08badc18fc540b8da2c526fb1b9b1988f87fd877648f53e952cd

          SHA512

          801c578d0a5910210c16143aa1f7911a228d8f17c301773316c36b1ea42bbc9ef0c5b70cc363bcdf4df837f701f55fd23602c3fd025d70462912a6d871420efd

        • memory/1020-139-0x0000000000000000-mapping.dmp
        • memory/1036-147-0x0000000000000000-mapping.dmp
        • memory/1288-138-0x0000000000000000-mapping.dmp
        • memory/1868-145-0x0000000006A40000-0x0000000006ADC000-memory.dmp
          Filesize

          624KB

        • memory/1868-140-0x0000000000000000-mapping.dmp
        • memory/2224-130-0x0000000000250000-0x00000000002EE000-memory.dmp
          Filesize

          632KB

        • memory/2224-137-0x00000000059E0000-0x0000000005A72000-memory.dmp
          Filesize

          584KB

        • memory/2224-135-0x0000000005B10000-0x0000000005CD2000-memory.dmp
          Filesize

          1.8MB

        • memory/2224-134-0x0000000005EF0000-0x0000000006494000-memory.dmp
          Filesize

          5.6MB

        • memory/2224-131-0x0000000004E90000-0x0000000004EB2000-memory.dmp
          Filesize

          136KB

        • memory/2224-132-0x0000000004F30000-0x0000000004F96000-memory.dmp
          Filesize

          408KB

        • memory/3000-144-0x0000000000000000-mapping.dmp
        • memory/3176-133-0x0000000000000000-mapping.dmp
        • memory/3676-148-0x0000000000000000-mapping.dmp
        • memory/3676-149-0x0000000000400000-0x0000000000425000-memory.dmp
          Filesize

          148KB

        • memory/3676-151-0x0000000000400000-0x0000000000425000-memory.dmp
          Filesize

          148KB

        • memory/3676-152-0x0000000000400000-0x0000000000425000-memory.dmp
          Filesize

          148KB

        • memory/4176-136-0x0000000000000000-mapping.dmp
        • memory/4820-143-0x0000000000000000-mapping.dmp
        • memory/4984-146-0x0000000000000000-mapping.dmp