Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-07-2022 08:21

General

  • Target

    46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe

  • Size

    304KB

  • MD5

    d01c6c9d0ee7718220385bb50e674979

  • SHA1

    5f173f9d3898427109863869f412071bb3983add

  • SHA256

    46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

  • SHA512

    e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

Malware Config

Signatures

  • NetWire RAT payload 9 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
    "C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:4312
    • C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
      C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Install\Host.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:4952
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          C:\Users\Admin\AppData\Roaming\Install\Host.exe
          4⤵
          • Executes dropped EXE
          PID:2920
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 316
            5⤵
            • Program crash
            PID:3856
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          C:\Users\Admin\AppData\Roaming\Install\Host.exe
          4⤵
          • Executes dropped EXE
          PID:672
    • C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
      C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
      2⤵
      • Executes dropped EXE
      PID:2276
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2920 -ip 2920
    1⤵
      PID:3724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      304KB

      MD5

      d01c6c9d0ee7718220385bb50e674979

      SHA1

      5f173f9d3898427109863869f412071bb3983add

      SHA256

      46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1

      SHA512

      e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a

    • memory/672-173-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/672-172-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/672-167-0x0000000000000000-mapping.dmp

    • memory/2008-143-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2008-140-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2008-139-0x0000000000000000-mapping.dmp

    • memory/2008-147-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2276-153-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2276-155-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2276-148-0x0000000000000000-mapping.dmp

    • memory/2920-156-0x0000000000000000-mapping.dmp

    • memory/2920-162-0x0000000000350000-0x0000000000375000-memory.dmp

      Filesize

      148KB

    • memory/2920-166-0x0000000000350000-0x0000000000375000-memory.dmp

      Filesize

      148KB

    • memory/3372-137-0x0000000006170000-0x0000000006714000-memory.dmp

      Filesize

      5.6MB

    • memory/3372-138-0x00000000067C0000-0x000000000685C000-memory.dmp

      Filesize

      624KB

    • memory/3372-130-0x00000000004A0000-0x00000000004F2000-memory.dmp

      Filesize

      328KB

    • memory/3372-135-0x0000000004EE0000-0x0000000004F02000-memory.dmp

      Filesize

      136KB

    • memory/3372-134-0x00000000051F0000-0x00000000053B2000-memory.dmp

      Filesize

      1.8MB

    • memory/3372-133-0x0000000004F80000-0x0000000005012000-memory.dmp

      Filesize

      584KB

    • memory/3372-132-0x0000000004E70000-0x0000000004ED6000-memory.dmp

      Filesize

      408KB

    • memory/3372-131-0x0000000004DD0000-0x0000000004DF2000-memory.dmp

      Filesize

      136KB

    • memory/4312-136-0x0000000000000000-mapping.dmp

    • memory/4776-144-0x0000000000000000-mapping.dmp

    • memory/4952-154-0x0000000000000000-mapping.dmp