Analysis

  • max time kernel
    178s
  • max time network
    241s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-07-2022 16:22

General

  • Target

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe

  • Size

    192KB

  • MD5

    156e82b43c311a45552a5a6f44247804

  • SHA1

    108b1578ee10e7e531b6cd0bda86e545114b286a

  • SHA256

    3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

  • SHA512

    f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
    "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
      "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
      2⤵
        PID:688
      • C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe
        "C:\Users\Admin\AppData\Local\Temp\3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"
            4⤵
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Adds Run key to start application
            PID:3528

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

      Filesize

      192KB

      MD5

      156e82b43c311a45552a5a6f44247804

      SHA1

      108b1578ee10e7e531b6cd0bda86e545114b286a

      SHA256

      3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

      SHA512

      f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

    • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

      Filesize

      192KB

      MD5

      156e82b43c311a45552a5a6f44247804

      SHA1

      108b1578ee10e7e531b6cd0bda86e545114b286a

      SHA256

      3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

      SHA512

      f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

    • C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe

      Filesize

      192KB

      MD5

      156e82b43c311a45552a5a6f44247804

      SHA1

      108b1578ee10e7e531b6cd0bda86e545114b286a

      SHA256

      3b787a076300a1c2329da7190322a126cc5edbd0e8ce7cb8719d322d3b615364

      SHA512

      f740a6848db7cd4f6490501a00ce0abd28469b4f66ae242e752c1d02e66ab652a4bbe350039a84669107db7edf0aa72cb5b3240041267eeea5a3b3198f085381

    • memory/688-131-0x0000000000000000-mapping.dmp

    • memory/2156-139-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2156-135-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2156-133-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2156-132-0x0000000000000000-mapping.dmp

    • memory/2432-137-0x0000000000000000-mapping.dmp

    • memory/2432-146-0x0000000074F00000-0x00000000754B1000-memory.dmp

      Filesize

      5.7MB

    • memory/3528-141-0x0000000000000000-mapping.dmp

    • memory/3528-147-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/4380-136-0x0000000074F00000-0x00000000754B1000-memory.dmp

      Filesize

      5.7MB

    • memory/4380-130-0x0000000074F00000-0x00000000754B1000-memory.dmp

      Filesize

      5.7MB