Analysis

  • max time kernel
    94s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 17:54

General

  • Target

    1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe

  • Size

    1.9MB

  • MD5

    981c378f3cd851641dceeebd67813eb2

  • SHA1

    8a57f4750c4bc0fe9f7e81a40cb9aa8345024c32

  • SHA256

    1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276

  • SHA512

    ee310207d3561f5bec513606cc543d5861745b09323952d4c1a10169a74e9967f17779298a79059d869b22aba655925acb36def827cd82b6ebb899921b94be65

Malware Config

Extracted

Family

netwire

C2

timduck.duckdns.org:1194

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    HXiMHiTC

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • NetWire RAT payload 6 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Delays execution with timeout.exe 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe
    "C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:3572
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:4312
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:2068
    • C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe
      "C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe"
      2⤵
        PID:824
      • C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe
        "C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Checks computer location settings
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1244
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout 1
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2288
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              5⤵
              • Delays execution with timeout.exe
              PID:1940
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout 1
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4772
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              5⤵
              • Delays execution with timeout.exe
              PID:4380
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout 1
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4728
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              5⤵
              • Delays execution with timeout.exe
              PID:2776
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:4064
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 1708
            4⤵
            • Program crash
            PID:2364
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1596
        2⤵
        • Program crash
        PID:2576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 2632
      1⤵
        PID:2468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1244 -ip 1244
        1⤵
          PID:2932

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Install\Host.exe

          Filesize

          1.9MB

          MD5

          981c378f3cd851641dceeebd67813eb2

          SHA1

          8a57f4750c4bc0fe9f7e81a40cb9aa8345024c32

          SHA256

          1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276

          SHA512

          ee310207d3561f5bec513606cc543d5861745b09323952d4c1a10169a74e9967f17779298a79059d869b22aba655925acb36def827cd82b6ebb899921b94be65

        • C:\Users\Admin\AppData\Roaming\Install\Host.exe

          Filesize

          1.9MB

          MD5

          981c378f3cd851641dceeebd67813eb2

          SHA1

          8a57f4750c4bc0fe9f7e81a40cb9aa8345024c32

          SHA256

          1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276

          SHA512

          ee310207d3561f5bec513606cc543d5861745b09323952d4c1a10169a74e9967f17779298a79059d869b22aba655925acb36def827cd82b6ebb899921b94be65

        • C:\Users\Admin\AppData\Roaming\Install\Host.exe

          Filesize

          1.9MB

          MD5

          981c378f3cd851641dceeebd67813eb2

          SHA1

          8a57f4750c4bc0fe9f7e81a40cb9aa8345024c32

          SHA256

          1484955ff8374ea3faaab775c666cfd51c7cc827361d8272ddc5041c9b04b276

          SHA512

          ee310207d3561f5bec513606cc543d5861745b09323952d4c1a10169a74e9967f17779298a79059d869b22aba655925acb36def827cd82b6ebb899921b94be65

        • memory/824-141-0x0000000000000000-mapping.dmp

        • memory/1244-147-0x0000000000000000-mapping.dmp

        • memory/1932-135-0x0000000000000000-mapping.dmp

        • memory/1940-151-0x0000000000000000-mapping.dmp

        • memory/2068-140-0x0000000000000000-mapping.dmp

        • memory/2288-150-0x0000000000000000-mapping.dmp

        • memory/2440-142-0x0000000000000000-mapping.dmp

        • memory/2440-143-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2440-145-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2440-146-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2632-130-0x0000000000DF0000-0x0000000000FDC000-memory.dmp

          Filesize

          1.9MB

        • memory/2632-134-0x0000000005A10000-0x0000000005A1A000-memory.dmp

          Filesize

          40KB

        • memory/2632-133-0x0000000005BC0000-0x0000000005C52000-memory.dmp

          Filesize

          584KB

        • memory/2632-132-0x0000000005FC0000-0x0000000006564000-memory.dmp

          Filesize

          5.6MB

        • memory/2632-131-0x0000000005970000-0x0000000005A0C000-memory.dmp

          Filesize

          624KB

        • memory/2776-155-0x0000000000000000-mapping.dmp

        • memory/3572-136-0x0000000000000000-mapping.dmp

        • memory/3736-137-0x0000000000000000-mapping.dmp

        • memory/4064-156-0x0000000000000000-mapping.dmp

        • memory/4064-160-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4064-161-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4064-162-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4312-138-0x0000000000000000-mapping.dmp

        • memory/4380-153-0x0000000000000000-mapping.dmp

        • memory/4728-154-0x0000000000000000-mapping.dmp

        • memory/4772-152-0x0000000000000000-mapping.dmp

        • memory/5064-139-0x0000000000000000-mapping.dmp