Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 20:10

General

  • Target

    38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe

  • Size

    351KB

  • MD5

    c6880d3f845a57d080145d53a6ac58e3

  • SHA1

    cca382986b9969b6b2e4210655f5e71b001964bf

  • SHA256

    38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

  • SHA512

    d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec

Malware Config

Extracted

Family

netwire

C2

ASKJHDASKDHSHTD.RU:6971

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    mqIhDWwE

  • offline_keylogger

    false

  • password

    ppF7"oRyqm

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe
    "C:\Users\Admin\AppData\Local\Temp\38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:3296
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a.exe" "C:\Users\Admin\AppData\Local\svsc.exe"
      2⤵
      • NTFS ADS
      PID:1948
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\svsc.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Users\Admin\AppData\Local\svsc.exe
        "C:\Users\Admin\AppData\Local\svsc.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\svsc.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:4308
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\svsc.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:112
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
            PID:3748
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\system32\svchost.exe"
            4⤵
              PID:3924

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\svsc.exe

        Filesize

        351KB

        MD5

        c6880d3f845a57d080145d53a6ac58e3

        SHA1

        cca382986b9969b6b2e4210655f5e71b001964bf

        SHA256

        38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

        SHA512

        d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec

      • C:\Users\Admin\AppData\Local\svsc.exe

        Filesize

        351KB

        MD5

        c6880d3f845a57d080145d53a6ac58e3

        SHA1

        cca382986b9969b6b2e4210655f5e71b001964bf

        SHA256

        38665a270e357410c157e6865a88c3fe20b4954a9effe16c83e70efc8b65259a

        SHA512

        d9476d336b717decd4051bbbb5b5934dee4ef48b2d6e3256d9386feaa182f8107c13e178a1c7cd5ca8d1d478bae34d588a17229d1acf9138148025e801e018ec

      • memory/112-144-0x0000000000000000-mapping.dmp

      • memory/852-145-0x00000000062B0000-0x000000000634C000-memory.dmp

        Filesize

        624KB

      • memory/852-140-0x0000000000000000-mapping.dmp

      • memory/1512-139-0x0000000000000000-mapping.dmp

      • memory/1948-138-0x0000000000000000-mapping.dmp

      • memory/2288-133-0x0000000000000000-mapping.dmp

      • memory/3296-136-0x0000000000000000-mapping.dmp

      • memory/3748-146-0x0000000000000000-mapping.dmp

      • memory/3924-147-0x0000000000000000-mapping.dmp

      • memory/3924-148-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/3924-150-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/3924-151-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/4140-137-0x0000000005DD0000-0x0000000005E62000-memory.dmp

        Filesize

        584KB

      • memory/4140-135-0x0000000006610000-0x0000000006BB4000-memory.dmp

        Filesize

        5.6MB

      • memory/4140-132-0x00000000053B0000-0x0000000005416000-memory.dmp

        Filesize

        408KB

      • memory/4140-131-0x0000000005310000-0x0000000005332000-memory.dmp

        Filesize

        136KB

      • memory/4140-130-0x0000000000930000-0x000000000098E000-memory.dmp

        Filesize

        376KB

      • memory/4140-134-0x0000000005E90000-0x0000000006052000-memory.dmp

        Filesize

        1.8MB

      • memory/4308-143-0x0000000000000000-mapping.dmp