Analysis
-
max time kernel
116s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 03:53
Static task
static1
Behavioral task
behavioral1
Sample
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe
Resource
win10v2004-20220414-en
General
-
Target
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe
-
Size
632KB
-
MD5
29b89507364a0868ff24aa52e9f9a30f
-
SHA1
a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
-
SHA256
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
-
SHA512
c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611
Malware Config
Extracted
netwire
missserver1000.hopto.org:8309
-
activex_autorun
true
-
activex_key
{07Y11VWU-UPYY-ATCE-P44Q-I8QQU17V03VB}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1352-63-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/1352-64-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1956-88-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/1956-89-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1956-96-0x00000000773C0000-0x0000000077540000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1204 Host.exe 1956 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07Y11VWU-UPYY-ATCE-P44Q-I8QQU17V03VB} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07Y11VWU-UPYY-ATCE-P44Q-I8QQU17V03VB}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 2 IoCs
Processes:
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exepid process 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exeHost.exedescription pid process target process PID 1756 set thread context of 1352 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe PID 1204 set thread context of 1956 1204 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exeHost.exepid process 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe 1204 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exeff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exeHost.exedescription pid process target process PID 1756 wrote to memory of 1352 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe PID 1756 wrote to memory of 1352 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe PID 1756 wrote to memory of 1352 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe PID 1756 wrote to memory of 1352 1756 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe PID 1352 wrote to memory of 1204 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe Host.exe PID 1352 wrote to memory of 1204 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe Host.exe PID 1352 wrote to memory of 1204 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe Host.exe PID 1352 wrote to memory of 1204 1352 ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe Host.exe PID 1204 wrote to memory of 1956 1204 Host.exe Host.exe PID 1204 wrote to memory of 1956 1204 Host.exe Host.exe PID 1204 wrote to memory of 1956 1204 Host.exe Host.exe PID 1204 wrote to memory of 1956 1204 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe"C:\Users\Admin\AppData\Local\Temp\ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exeC:\Users\Admin\AppData\Local\Temp\ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD529b89507364a0868ff24aa52e9f9a30f
SHA1a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
SHA256ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
SHA512c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611
-
Filesize
632KB
MD529b89507364a0868ff24aa52e9f9a30f
SHA1a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
SHA256ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
SHA512c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611
-
Filesize
632KB
MD529b89507364a0868ff24aa52e9f9a30f
SHA1a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
SHA256ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
SHA512c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611
-
Filesize
632KB
MD529b89507364a0868ff24aa52e9f9a30f
SHA1a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
SHA256ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
SHA512c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611
-
Filesize
632KB
MD529b89507364a0868ff24aa52e9f9a30f
SHA1a33e07b0f35d1fa69c732b8ef03fbd045c1d443d
SHA256ff0b1d9f2221e78773cfed9e89f87eab3add2c872f44f7f8cd10e18e2e0e8465
SHA512c7c4e572fbeaa3e10c9f5754b94e56efbcbcad5f6aa2b144e8b8a12d5fd3f43e16465f0b771c39e5d94167ae95416a2a5ebaa1a1b0329c3a7ba652fb13f34611