Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 03:14
Static task
static1
Behavioral task
behavioral1
Sample
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe
Resource
win7-20220414-en
General
-
Target
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe
-
Size
156KB
-
MD5
3086fd608ff06991a94b3f7ed891f4ef
-
SHA1
69112497cd3a29c87a5d5a657aa51f63ef34ce2c
-
SHA256
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568
-
SHA512
b810802141018bf4c970e6b747097f103ba6b7a7f4eaaa305d7d6c5f56e556fa18e8e3edbccfeb140f5250971dd7942b31a18c6ce06d7ead906d4fa2a4179521
Malware Config
Extracted
netwire
79.172.242.85:1406
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
gqllpDVm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tmp.exe netwire C:\Users\Admin\AppData\Local\Temp\tmp.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire -
Executes dropped EXE 2 IoCs
Processes:
tmp.exeHost.exepid process 4420 tmp.exe 3360 Host.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\filename.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\filename.exe cmd.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe File opened for modification C:\Windows\assembly\Desktop.ini 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe -
Drops file in Windows directory 3 IoCs
Processes:
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe File opened for modification C:\Windows\assembly\Desktop.ini 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe File opened for modification C:\Windows\assembly 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exetmp.exedescription pid process target process PID 332 wrote to memory of 5056 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe cmd.exe PID 332 wrote to memory of 5056 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe cmd.exe PID 332 wrote to memory of 5056 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe cmd.exe PID 332 wrote to memory of 4420 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe tmp.exe PID 332 wrote to memory of 4420 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe tmp.exe PID 332 wrote to memory of 4420 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe tmp.exe PID 332 wrote to memory of 4528 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe RegAsm.exe PID 332 wrote to memory of 4528 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe RegAsm.exe PID 332 wrote to memory of 4528 332 70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe RegAsm.exe PID 4420 wrote to memory of 3360 4420 tmp.exe Host.exe PID 4420 wrote to memory of 3360 4420 tmp.exe Host.exe PID 4420 wrote to memory of 3360 4420 tmp.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe"C:\Users\Admin\AppData\Local\Temp\70441312a820a461c723a69b991befae918d74843c348aabd7a25899e0c31568.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\agdfdffhit.bat2⤵
- Drops startup file
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe2⤵PID:4528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD53f4ffefff831f9b885a54b3638659236
SHA1ec860ca0707fd091e75c7ada9f25593ffd33041d
SHA2569a2feef00e6fbcd4cc7da0ebc2e5c635aafbff45c9d2e799b09e17276144cda8
SHA512b20312cab57b9dd79b4b8a39cbdd2b74aadbdd7c42a7d4cbb8ceda943ffc4993515594a13be0797a0ceb7f51d6cda92c7324279c8bbee9fbe07f05196929726f
-
Filesize
132KB
MD5f64f409c49101aed109813b4c155c333
SHA12794f7fac2c99b4ff14b36753eebc276ef89fa50
SHA256fced6eb5ab80abf00c0bc80101ec5ba3b81941fe8022be0952ed6be0079db1c9
SHA512dfd9047d26f34da89ddfef19adb2ef52bd8a58d6199df178fe401298f5d19807bc8e69bf943dfdc8fde20198d06c654507de91362a47a3e45c26855468018572
-
Filesize
132KB
MD5f64f409c49101aed109813b4c155c333
SHA12794f7fac2c99b4ff14b36753eebc276ef89fa50
SHA256fced6eb5ab80abf00c0bc80101ec5ba3b81941fe8022be0952ed6be0079db1c9
SHA512dfd9047d26f34da89ddfef19adb2ef52bd8a58d6199df178fe401298f5d19807bc8e69bf943dfdc8fde20198d06c654507de91362a47a3e45c26855468018572
-
Filesize
132KB
MD5f64f409c49101aed109813b4c155c333
SHA12794f7fac2c99b4ff14b36753eebc276ef89fa50
SHA256fced6eb5ab80abf00c0bc80101ec5ba3b81941fe8022be0952ed6be0079db1c9
SHA512dfd9047d26f34da89ddfef19adb2ef52bd8a58d6199df178fe401298f5d19807bc8e69bf943dfdc8fde20198d06c654507de91362a47a3e45c26855468018572
-
Filesize
132KB
MD5f64f409c49101aed109813b4c155c333
SHA12794f7fac2c99b4ff14b36753eebc276ef89fa50
SHA256fced6eb5ab80abf00c0bc80101ec5ba3b81941fe8022be0952ed6be0079db1c9
SHA512dfd9047d26f34da89ddfef19adb2ef52bd8a58d6199df178fe401298f5d19807bc8e69bf943dfdc8fde20198d06c654507de91362a47a3e45c26855468018572