Analysis
-
max time kernel
137s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:38
Static task
static1
Behavioral task
behavioral1
Sample
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe
-
Size
1.1MB
-
MD5
af7f49ce2086c5254186387d64df2347
-
SHA1
1fe82d6f4184d79e425be3eab340caa6950af4ed
-
SHA256
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a
-
SHA512
1020846174c9323c7944effd2465026923dc4fa529d70e34628a5d80a95e3978a562981e92e7d604b3bf67a28f7042002f123fb31ae3e32e9abb92fef0c2d578
Malware Config
Extracted
Family
netwire
C2
79.134.225.73:1968
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5028-131-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/5028-140-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iscsicli.url aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exedescription pid process target process PID 4836 set thread context of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exepid process 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exepid process 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exepid process 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exedescription pid process target process PID 4836 wrote to memory of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe PID 4836 wrote to memory of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe PID 4836 wrote to memory of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe PID 4836 wrote to memory of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe PID 4836 wrote to memory of 5028 4836 aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe"C:\Users\Admin\AppData\Local\Temp\aa6ecaf24e19acf01608ae18a266c8bd1c7c16184df535afc1c032345e5eac3a.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:5028