Analysis
-
max time kernel
42s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 11:16
Static task
static1
Behavioral task
behavioral1
Sample
41afcc620b9a87add5322f3f17d563bb.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
41afcc620b9a87add5322f3f17d563bb.exe
-
Size
75KB
-
MD5
41afcc620b9a87add5322f3f17d563bb
-
SHA1
308238e449d97520e21cfb601feb15193bf89a68
-
SHA256
7418fd3ec75f43bed921ecf2df4ba922fbd86c2e1e158bf309bbee13d4374125
-
SHA512
1dde37ed40097e22543f95f29db4fe7b5f7c0c68f11e738491f36a2121a6fa54578d4dadb3988f84f42b903559326684b374704d46a2c4fc7d6e12f87a397754
Malware Config
Extracted
Family
netwire
C2
194.5.98.176:3363
194.5.98.176:3365
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
power2022
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-69-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-70-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-71-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-73-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-74-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-75-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1728-78-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1728-79-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41afcc620b9a87add5322f3f17d563bb.exedescription pid process target process PID 968 set thread context of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exe41afcc620b9a87add5322f3f17d563bb.exepid process 1324 powershell.exe 968 41afcc620b9a87add5322f3f17d563bb.exe 968 41afcc620b9a87add5322f3f17d563bb.exe 968 41afcc620b9a87add5322f3f17d563bb.exe 968 41afcc620b9a87add5322f3f17d563bb.exe 968 41afcc620b9a87add5322f3f17d563bb.exe 968 41afcc620b9a87add5322f3f17d563bb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
41afcc620b9a87add5322f3f17d563bb.exepowershell.exedescription pid process Token: SeDebugPrivilege 968 41afcc620b9a87add5322f3f17d563bb.exe Token: SeDebugPrivilege 1324 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
41afcc620b9a87add5322f3f17d563bb.exedescription pid process target process PID 968 wrote to memory of 1324 968 41afcc620b9a87add5322f3f17d563bb.exe powershell.exe PID 968 wrote to memory of 1324 968 41afcc620b9a87add5322f3f17d563bb.exe powershell.exe PID 968 wrote to memory of 1324 968 41afcc620b9a87add5322f3f17d563bb.exe powershell.exe PID 968 wrote to memory of 1324 968 41afcc620b9a87add5322f3f17d563bb.exe powershell.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 976 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe PID 968 wrote to memory of 1728 968 41afcc620b9a87add5322f3f17d563bb.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41afcc620b9a87add5322f3f17d563bb.exe"C:\Users\Admin\AppData\Local\Temp\41afcc620b9a87add5322f3f17d563bb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:976
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1728