Analysis
-
max time kernel
112s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 02:13
Static task
static1
Behavioral task
behavioral1
Sample
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe
Resource
win7-20220414-en
General
-
Target
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe
-
Size
496KB
-
MD5
3160a283284befd2f59cce3be5341e75
-
SHA1
1809a6d9c10bbce9b46664d47489995f8940f615
-
SHA256
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604
-
SHA512
43abc8066702adddc0b7d2914f786b2daa8324ed3254c42a98907639302d9716063ebc6f48b427e064db6770df7f1716dcca2a8ff6534789aa69b0982378edb0
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3008-142-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3008-144-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3008-145-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.url 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exedescription pid process target process PID 332 set thread context of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exepid process 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exedescription pid process Token: SeDebugPrivilege 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.execsc.exedescription pid process target process PID 332 wrote to memory of 5056 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe csc.exe PID 332 wrote to memory of 5056 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe csc.exe PID 332 wrote to memory of 5056 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe csc.exe PID 5056 wrote to memory of 1412 5056 csc.exe cvtres.exe PID 5056 wrote to memory of 1412 5056 csc.exe cvtres.exe PID 5056 wrote to memory of 1412 5056 csc.exe cvtres.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe PID 332 wrote to memory of 3008 332 3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe"C:\Users\Admin\AppData\Local\Temp\3f417cc402322ac8717f904400b28d6cd169b133e521a6dd677e3ca441088604.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qft11vjy\qft11vjy.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES92DE.tmp" "c:\Users\Admin\AppData\Local\Temp\qft11vjy\CSC819D68A378E94B3DB964DF6DAA8C2CAF.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES92DE.tmpFilesize
1KB
MD54362b5017adc350f1ca0b1d3a17dbc59
SHA1bf779e11c142451a3166e6720401342ceb0e5775
SHA256b290f68689e3f0a0b2882577899e195c5186e0b6710cf20e2e881802886fc8e8
SHA512825e717db1a348c99eff17e2fde42eb9fcd216e908008cdb1c4d7923a10e8690241ce18c62e148c37c3cae2c0f41c716d4a69b57d01c41591690f31d0a101bb8
-
C:\Users\Admin\AppData\Local\Temp\qft11vjy\qft11vjy.dllFilesize
26KB
MD5c4250d1c9ca5614a786381e2c708e8b4
SHA1c8215c1a25f02727f1fbc53b137cd88a8582a2dc
SHA256e9912a2ec908e385c1c5b8b94d83ec96a5acf3bef2e4927528c8f85c444cd877
SHA5121856a66b417d0f1ca42401b01ffe215da65baeebcd9c7622a1fe89c7c5d035ab138a464f673f067810436aead2bd9789c9c182ab4099888b733461d63d0a76c9
-
C:\Users\Admin\AppData\Local\Temp\qft11vjy\qft11vjy.pdbFilesize
85KB
MD5472bf314e4630423498bf978edaeeadc
SHA15a3435fd83fd36a6ad5c861c63b5734f1b3bd663
SHA2564b1c69d4fcec174ab1ddba84202bb0a895d646c33a6728d912c8e61c25879b44
SHA512f21ad82c6fe0c73b44982be0b54d634e375d86bab154b22055f5351fbb28e7f2efae84af6d953609c4c416c6a5106304de10c13536346f5d5e722ceba6161d95
-
\??\c:\Users\Admin\AppData\Local\Temp\qft11vjy\CSC819D68A378E94B3DB964DF6DAA8C2CAF.TMPFilesize
1KB
MD5bf4b91bf5891d5295a047bc407e811bd
SHA11d196b4a66f7c7a1f33619b26ec797db89cfa651
SHA256a38f61479ad1d8cc64ec2a447869a45e7a5a9efdf6978833b7b7709b2c6f2290
SHA512342dab89c9697e9b757ad413d06757e8ada2e6681dd2fd328d61818fb638db1cd227d7243e06b52d0e7bcf3f7af44c5befa1b02694a3abb64525666d318c918c
-
\??\c:\Users\Admin\AppData\Local\Temp\qft11vjy\qft11vjy.0.csFilesize
66KB
MD536c98e4b49e2b715c0e3a0f982f08c58
SHA164b078a959f8a3965e18ea7aa6e5d586a0054ce9
SHA256b43826d45019a608dbbbe8017215175f4f45cd730564dd4be031d97dcfcb5f1a
SHA512234a84164bc1cce3c51091c66d90a34597eaa1541724efd17f6e27ad5fb8c7264493d791455fff61074f8c6de8c7f9e47e094e31d2d065f36c7d69f296298503
-
\??\c:\Users\Admin\AppData\Local\Temp\qft11vjy\qft11vjy.cmdlineFilesize
312B
MD57e2c00b91c14382929d8e4b00d6c850b
SHA1b312276bcba60842444f09131e74ba963b431d85
SHA256a1e97e5fdd1ac73cae072d699f48b074630e49cd6ea7a1ca12aaa809825d65ac
SHA512f686c72d1045d51308a4d7e03e3b1da9ebf46b7cde17cf99d6a825655547b3f55c0c5d5f39c1521d882c7c06ba4f8fcfab207393c6c64581a8b7c4e5464c89e7
-
memory/332-130-0x0000000000230000-0x00000000002B0000-memory.dmpFilesize
512KB
-
memory/332-139-0x0000000004C30000-0x0000000004CC2000-memory.dmpFilesize
584KB
-
memory/332-140-0x0000000005370000-0x000000000540C000-memory.dmpFilesize
624KB
-
memory/1412-134-0x0000000000000000-mapping.dmp
-
memory/3008-141-0x0000000000000000-mapping.dmp
-
memory/3008-142-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3008-144-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3008-145-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/5056-131-0x0000000000000000-mapping.dmp