Analysis
-
max time kernel
109s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe
-
Size
448KB
-
MD5
44a765fe57dea1ae7b642010c7209932
-
SHA1
3e97fc2183c9af4d8f71d0a546b6c2611495a46c
-
SHA256
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b
-
SHA512
6ecba354b1cd685588cf7aa44092d99e227a7e99bfd1c9b8811960a556e556b555853560271b1cc4f8744dbbd95c726b6ce183ae9fdd298efaf7bcd551d1edae
Malware Config
Extracted
Family
netwire
C2
popen.ru:6970
dhfgh.online:6970
popen43.ru:6970
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
SC Native
-
lock_executable
false
-
mutex
OjxxiSpn
-
offline_keylogger
false
-
password
ppF7"oRyqm
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-59-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ojjgotlkaiwzmmb.eu.url 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exedescription pid process target process PID 1980 set thread context of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exepid process 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exepid process 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exedescription pid process target process PID 1980 wrote to memory of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe PID 1980 wrote to memory of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe PID 1980 wrote to memory of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe PID 1980 wrote to memory of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe PID 1980 wrote to memory of 1920 1980 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe 3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe"C:\Users\Admin\AppData\Local\Temp\3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe"C:\Users\Admin\AppData\Local\Temp\3d6bc146d5338159005ae3d66c7fda67a6ada1dc1a66b4ab17301ef4ec1b665b.exe"2⤵PID:1920