Analysis

  • max time kernel
    164s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 04:18

General

  • Target

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe

  • Size

    656KB

  • MD5

    714bcb747c559e227f47ea71a05fb52e

  • SHA1

    f8b07712e284cd4c00c555ee07482be321749a0a

  • SHA256

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

  • SHA512

    ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe
    "C:\Users\Admin\AppData\Local\Temp\41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe
      "C:\Users\Admin\AppData\Local\Temp\41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    656KB

    MD5

    714bcb747c559e227f47ea71a05fb52e

    SHA1

    f8b07712e284cd4c00c555ee07482be321749a0a

    SHA256

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

    SHA512

    ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    656KB

    MD5

    714bcb747c559e227f47ea71a05fb52e

    SHA1

    f8b07712e284cd4c00c555ee07482be321749a0a

    SHA256

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

    SHA512

    ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    656KB

    MD5

    714bcb747c559e227f47ea71a05fb52e

    SHA1

    f8b07712e284cd4c00c555ee07482be321749a0a

    SHA256

    41e24008114e3824dedccf90a28e47a85602b14f6890dd5d61a947073b7d4577

    SHA512

    ae5eb450917afc8b2cf71c5db8d59e8b0e557cd1b7b80c19384f74678f61b03bed61ef6d6ccf60f36b89091cee5425dd4d43b16650a51788ac5a2b1852bd7569

  • memory/3220-160-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-150-0x0000000000000000-mapping.dmp

  • memory/3220-161-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/3220-159-0x00000000020C0000-0x00000000020CE000-memory.dmp

    Filesize

    56KB

  • memory/4104-147-0x0000000000610000-0x000000000061E000-memory.dmp

    Filesize

    56KB

  • memory/4104-155-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/4104-146-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/4104-138-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/4104-148-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4104-149-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/4104-139-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/4104-133-0x0000000000000000-mapping.dmp

  • memory/4104-140-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4104-153-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4104-137-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4240-134-0x0000000000720000-0x000000000072E000-memory.dmp

    Filesize

    56KB

  • memory/4240-136-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/4240-135-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4240-132-0x0000000000720000-0x000000000072E000-memory.dmp

    Filesize

    56KB

  • memory/4392-157-0x0000000000000000-mapping.dmp

  • memory/4392-163-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-166-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB

  • memory/4392-171-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/4392-172-0x0000000000600000-0x000000000060E000-memory.dmp

    Filesize

    56KB

  • memory/4392-173-0x00007FFB6DEF0000-0x00007FFB6E0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-174-0x00000000772D0000-0x0000000077473000-memory.dmp

    Filesize

    1.6MB