Analysis
-
max time kernel
180s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 10:04
Static task
static1
Behavioral task
behavioral1
Sample
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe
Resource
win10v2004-20220414-en
General
-
Target
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe
-
Size
475KB
-
MD5
25e0f7ac790860ce8d5ddd8977b8f900
-
SHA1
1d4e1fd67dfce63b7b7f246fbd976802e15cd205
-
SHA256
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e
-
SHA512
1064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-62-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1708-64-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1708-65-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1708-68-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1708-73-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1308-84-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1308-90-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
HKRUN.exeHKRUN.exepid process 1800 HKRUN.exe 1308 HKRUN.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{KCU0IT3O-S203-3AK5-A012-E75586QE8077} HKRUN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{KCU0IT3O-S203-3AK5-A012-E75586QE8077}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe\"" HKRUN.exe -
Loads dropped DLL 1 IoCs
Processes:
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exepid process 1708 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ HKRUN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\ProLogs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe" HKRUN.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exeHKRUN.exedescription pid process target process PID 968 set thread context of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 1800 set thread context of 1308 1800 HKRUN.exe HKRUN.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exeHKRUN.exedescription pid process target process PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 968 wrote to memory of 1708 968 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe PID 1708 wrote to memory of 1800 1708 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe HKRUN.exe PID 1708 wrote to memory of 1800 1708 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe HKRUN.exe PID 1708 wrote to memory of 1800 1708 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe HKRUN.exe PID 1708 wrote to memory of 1800 1708 4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe PID 1800 wrote to memory of 1308 1800 HKRUN.exe HKRUN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe"C:\Users\Admin\AppData\Local\Temp\4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe"C:\Users\Admin\AppData\Local\Temp\4607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD525e0f7ac790860ce8d5ddd8977b8f900
SHA11d4e1fd67dfce63b7b7f246fbd976802e15cd205
SHA2564607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e
SHA5121064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471
-
Filesize
475KB
MD525e0f7ac790860ce8d5ddd8977b8f900
SHA11d4e1fd67dfce63b7b7f246fbd976802e15cd205
SHA2564607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e
SHA5121064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471
-
Filesize
475KB
MD525e0f7ac790860ce8d5ddd8977b8f900
SHA11d4e1fd67dfce63b7b7f246fbd976802e15cd205
SHA2564607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e
SHA5121064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471
-
Filesize
475KB
MD525e0f7ac790860ce8d5ddd8977b8f900
SHA11d4e1fd67dfce63b7b7f246fbd976802e15cd205
SHA2564607aa9e1d0bd5585399612789f6603d0232eaea52652bb1e03dc47c3c00150e
SHA5121064ae1687cd5973702ed672066b563a910ab8c204e901636e21701670c0fce4a80f6ecf6cdaf31e09c35ac255fb2922afbd20fca0cd3a72ecab23cf29a1d471