Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 00:49
Static task
static1
Behavioral task
behavioral1
Sample
42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe
Resource
win7-20220414-en
General
-
Target
42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe
-
Size
436KB
-
MD5
41b2c8f26f435bfce709422fa1ab7f2a
-
SHA1
047f9b1647ebda102db4feb0e3fcef8db41488c8
-
SHA256
42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163
-
SHA512
a6b8a277a966260d3bb0be3f546a0602cfbb0eb11e4381875e7ee07e457f216505572d281115c3e5683c8cd139c01263d7d15705056ef736e2d40328e80d606f
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/940-61-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/940-64-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/940-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/940-68-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/940-71-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
HKRUN.exepid process 320 HKRUN.exe -
Loads dropped DLL 1 IoCs
Processes:
Cvtres.exepid process 940 Cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exedescription pid process target process PID 1704 set thread context of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exeCvtres.exedescription pid process target process PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 1704 wrote to memory of 940 1704 42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe Cvtres.exe PID 940 wrote to memory of 320 940 Cvtres.exe HKRUN.exe PID 940 wrote to memory of 320 940 Cvtres.exe HKRUN.exe PID 940 wrote to memory of 320 940 Cvtres.exe HKRUN.exe PID 940 wrote to memory of 320 940 Cvtres.exe HKRUN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe"C:\Users\Admin\AppData\Local\Temp\42dc6f1019e1fc09805b94daf0561dbfa39b4991159f40431827ecb73c350163.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\Cvtres.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"3⤵
- Executes dropped EXE
PID:320
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2