Analysis

  • max time kernel
    145s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 16:22

General

  • Target

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe

  • Size

    192KB

  • MD5

    156e82b43c311a45552a5a6f44247804

  • SHA1

    108b1578ee10e7e531b6cd0bda86e545114b286a

  • SHA256

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

  • SHA512

    f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

Malware Config

Signatures

  • NetWire RAT payload 7 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
    "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
      "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
      2⤵
        PID:1656
      • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
        "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
        2⤵
          PID:1360
        • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
          "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1236
            • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"
              4⤵
              • Executes dropped EXE
              • Modifies Installed Components in the registry
              • Adds Run key to start application
              PID:588

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

        Filesize

        192KB

        MD5

        156e82b43c311a45552a5a6f44247804

        SHA1

        108b1578ee10e7e531b6cd0bda86e545114b286a

        SHA256

        3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

        SHA512

        f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

      • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

        Filesize

        192KB

        MD5

        156e82b43c311a45552a5a6f44247804

        SHA1

        108b1578ee10e7e531b6cd0bda86e545114b286a

        SHA256

        3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

        SHA512

        f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

      • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

        Filesize

        192KB

        MD5

        156e82b43c311a45552a5a6f44247804

        SHA1

        108b1578ee10e7e531b6cd0bda86e545114b286a

        SHA256

        3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

        SHA512

        f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

      • \Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

        Filesize

        192KB

        MD5

        156e82b43c311a45552a5a6f44247804

        SHA1

        108b1578ee10e7e531b6cd0bda86e545114b286a

        SHA256

        3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

        SHA512

        f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

      • \Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

        Filesize

        192KB

        MD5

        156e82b43c311a45552a5a6f44247804

        SHA1

        108b1578ee10e7e531b6cd0bda86e545114b286a

        SHA256

        3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

        SHA512

        f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

      • memory/588-84-0x00000000004021DA-mapping.dmp

      • memory/588-90-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-57-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-68-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-63-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-61-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-72-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-56-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-59-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/1068-64-0x00000000004021DA-mapping.dmp

      • memory/1236-71-0x0000000000000000-mapping.dmp

      • memory/1236-88-0x0000000074650000-0x0000000074BFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1944-67-0x0000000074690000-0x0000000074C3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1944-54-0x0000000075EF1000-0x0000000075EF3000-memory.dmp

        Filesize

        8KB

      • memory/1944-55-0x0000000074690000-0x0000000074C3B000-memory.dmp

        Filesize

        5.7MB