Analysis
-
max time kernel
77s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 14:53
Static task
static1
Behavioral task
behavioral1
Sample
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe
Resource
win10v2004-20220414-en
General
-
Target
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe
-
Size
1.2MB
-
MD5
f22c7168d2c41964a1dfbf99904a2843
-
SHA1
274337d271c26d63c9d36cd89a53456941d6f1df
-
SHA256
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
-
SHA512
8110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
Malware Config
Extracted
netwire
95.167.151.235:8973
-
activex_autorun
true
-
activex_key
{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1000-131-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1000-140-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4404-145-0x0000000000340000-0x000000000036C000-memory.dmp netwire behavioral2/memory/4404-154-0x0000000000340000-0x000000000036C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 3564 Host.exe 872 Host.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exeHost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe\"" 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{N0R5BAW8-0Q5K-W773-0566-88UJFGBT8MC5} 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe -
Drops startup file 2 IoCs
Processes:
Host.exe7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UsoClient.url Host.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UsoClient.url 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Host.exe7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe" 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exeHost.exedescription pid process target process PID 2360 set thread context of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 set thread context of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 3564 set thread context of 872 3564 Host.exe Host.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exepid process 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exeHost.exepid process 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 3564 Host.exe 3564 Host.exe 3564 Host.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exeHost.exepid process 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 3564 Host.exe 3564 Host.exe 3564 Host.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exeHost.exedescription pid process target process PID 2360 wrote to memory of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 1000 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 1000 wrote to memory of 3564 1000 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe Host.exe PID 1000 wrote to memory of 3564 1000 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe Host.exe PID 1000 wrote to memory of 3564 1000 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe Host.exe PID 2360 wrote to memory of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 2360 wrote to memory of 4404 2360 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe 7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe PID 3564 wrote to memory of 872 3564 Host.exe Host.exe PID 3564 wrote to memory of 872 3564 Host.exe Host.exe PID 3564 wrote to memory of 872 3564 Host.exe Host.exe PID 3564 wrote to memory of 872 3564 Host.exe Host.exe PID 3564 wrote to memory of 872 3564 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:872 -
C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"C:\Users\Admin\AppData\Local\Temp\7eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1.exe"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f22c7168d2c41964a1dfbf99904a2843
SHA1274337d271c26d63c9d36cd89a53456941d6f1df
SHA2567eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
SHA5128110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
-
Filesize
1.2MB
MD5f22c7168d2c41964a1dfbf99904a2843
SHA1274337d271c26d63c9d36cd89a53456941d6f1df
SHA2567eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
SHA5128110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
-
Filesize
1.2MB
MD5f22c7168d2c41964a1dfbf99904a2843
SHA1274337d271c26d63c9d36cd89a53456941d6f1df
SHA2567eee70df2995be6ecd28558f84f98b8885a28c329f8161e63e1e155cf46fb0e1
SHA5128110c4983e63ba678e4d4b8a9fd9ccc23ca14e8059fcfa2a4ff30e74f14bf68f4ac0dbf3d94be0ff0495509b13f97a57440410577de2be81ae335300b6c760eb
-
Filesize
76B
MD5cf768bfbe5100f21eff11c68392b8861
SHA1f7cf695fd73bbbfa6da81f383bc1f2d9a5db0b7f
SHA256dc0d13e2e1706d1a028e7d418dda3837db56fcd19b1309951f80641731b16715
SHA5125c38197c191a915c33a91e60d68cf239ddfcc43fbff9ed08ab4cbeafca5f6a1452587f89071955d741e9196149a47fde6c78c32d7bdfc1c37eb088c10f983c63
-
Filesize
105B
MD530b5c4918ac6f3f79d60c4cbccb66564
SHA162a4c67b3e56edb117f1382ee7cb805ed226ebc4
SHA256a107b661fde8b745b4b6e831b0fd7413dc39d628beec8e04e28e968c7e37fbda
SHA5128010b56dc271a50dae0e85d50d820dc8f74f662187cb5d9f5fffab02666619d2fe15daa5c86e9bcec0f2e3f331f57304f1ea0f995626483bd2d37fdd7f8f7c5d