Analysis
-
max time kernel
73s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-07-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
c67ad9e13a6d724d99a9fb69a69b7763.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c67ad9e13a6d724d99a9fb69a69b7763.exe
-
Size
553KB
-
MD5
c67ad9e13a6d724d99a9fb69a69b7763
-
SHA1
0048692e8662bdc8b8429bfda78d108f9cc3b125
-
SHA256
167b20bea3cf481d6b08785f82ce2f07dca108e925310df2e3c44b8f662509ec
-
SHA512
94b9adfb24edf0f618da898588c8bbab3e5436be22150a15030fa60f7c5b925664b19f3e3f68e7a15f3d133e2da159a6656e9374b7c8a1e38c375ea27aa84e56
Malware Config
Extracted
Family
netwire
C2
185.140.53.139:3367
185.140.53.139:3368
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Telkomsa@1
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-66-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-67-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-68-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-70-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-71-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-72-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1348-75-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-76-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1348-77-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c67ad9e13a6d724d99a9fb69a69b7763.exedescription pid process target process PID 1416 set thread context of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c67ad9e13a6d724d99a9fb69a69b7763.exedescription pid process target process PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe PID 1416 wrote to memory of 1348 1416 c67ad9e13a6d724d99a9fb69a69b7763.exe c67ad9e13a6d724d99a9fb69a69b7763.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67ad9e13a6d724d99a9fb69a69b7763.exe"C:\Users\Admin\AppData\Local\Temp\c67ad9e13a6d724d99a9fb69a69b7763.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\c67ad9e13a6d724d99a9fb69a69b7763.exe"C:\Users\Admin\AppData\Local\Temp\c67ad9e13a6d724d99a9fb69a69b7763.exe"2⤵PID:1348