Analysis
-
max time kernel
107s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 07:15
Static task
static1
Behavioral task
behavioral1
Sample
39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe
Resource
win10v2004-20220414-en
General
-
Target
39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe
-
Size
604KB
-
MD5
709f957e6dbe9b0c1457e92aa4cc48d6
-
SHA1
204d345363fd5d0d78d436d3d67cab1c335273ce
-
SHA256
39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
-
SHA512
be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f
Malware Config
Extracted
netwire
emthai.ddns.net:3365
emthai.ddns.net:1076
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Emathai%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
nOQDdboC
-
offline_keylogger
true
-
password
emthai18
-
registry_autorun
true
-
startup_name
Java_Updates
-
use_mutex
true
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1332-59-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1332-58-0x0000000000000000-mapping.dmp netwire behavioral1/memory/1332-62-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1332-68-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2020-72-0x0000000000000000-mapping.dmp netwire behavioral1/memory/2020-76-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2020-77-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2020-78-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 1196 Host.exe 2020 Host.exe -
Deletes itself 1 IoCs
pid Process 2020 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java_Updates = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 1196 Host.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1808 wrote to memory of 1332 1808 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 27 PID 1332 wrote to memory of 1196 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 28 PID 1332 wrote to memory of 1196 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 28 PID 1332 wrote to memory of 1196 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 28 PID 1332 wrote to memory of 1196 1332 39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe 28 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29 PID 1196 wrote to memory of 2020 1196 Host.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\39f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604KB
MD5709f957e6dbe9b0c1457e92aa4cc48d6
SHA1204d345363fd5d0d78d436d3d67cab1c335273ce
SHA25639f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
SHA512be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f
-
Filesize
604KB
MD5709f957e6dbe9b0c1457e92aa4cc48d6
SHA1204d345363fd5d0d78d436d3d67cab1c335273ce
SHA25639f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
SHA512be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f
-
Filesize
604KB
MD5709f957e6dbe9b0c1457e92aa4cc48d6
SHA1204d345363fd5d0d78d436d3d67cab1c335273ce
SHA25639f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
SHA512be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f
-
Filesize
604KB
MD5709f957e6dbe9b0c1457e92aa4cc48d6
SHA1204d345363fd5d0d78d436d3d67cab1c335273ce
SHA25639f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
SHA512be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f
-
Filesize
604KB
MD5709f957e6dbe9b0c1457e92aa4cc48d6
SHA1204d345363fd5d0d78d436d3d67cab1c335273ce
SHA25639f51c80d8d21e1ae2a007f80d67e24dbf3742a458dd53c7fc5e0ebf1ae92822
SHA512be56e882e28835c8e6c043d39d59510f3b3a6ce03517095c9d24c8fbca02a6d91c98bf4bd83579b3078fde4147201b010611959d5bb5cc2adfda24a5c2a3ba4f