Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 20:36
Static task
static1
Behavioral task
behavioral1
Sample
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe
Resource
win7-20220414-en
General
-
Target
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe
-
Size
562KB
-
MD5
fd238c0ed716ed40685e923bbd688312
-
SHA1
4039ff431cd19e2f8d29ffad4056375a09d11904
-
SHA256
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede
-
SHA512
319696d81f4f9acd8d19d6a5a6097ab0792691f314cdd8b5f69f6bce0969f30b77ce863bd2de97670f7a3ec8cc5cb6d5f1576ee29babef7a6c37b5b93b323014
Malware Config
Extracted
netwire
ahmed82.duckdns.org:31220
-
activex_autorun
true
-
activex_key
{MQ7E162C-G40B-POGC-BR10-W1R3U0M04M64}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-Nov%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/488-136-0x0000000000400000-0x000000000048D000-memory.dmp netwire behavioral2/memory/488-137-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 3948 Host.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exedescription pid process target process PID 2704 set thread context of 488 2704 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exeHost.exepid process 2704 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe 3948 Host.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exedescription pid process target process PID 2704 wrote to memory of 488 2704 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe PID 2704 wrote to memory of 488 2704 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe PID 2704 wrote to memory of 488 2704 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe PID 488 wrote to memory of 3948 488 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe Host.exe PID 488 wrote to memory of 3948 488 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe Host.exe PID 488 wrote to memory of 3948 488 403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe"C:\Users\Admin\AppData\Local\Temp\403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exeC:\Users\Admin\AppData\Local\Temp\403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
562KB
MD5fd238c0ed716ed40685e923bbd688312
SHA14039ff431cd19e2f8d29ffad4056375a09d11904
SHA256403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede
SHA512319696d81f4f9acd8d19d6a5a6097ab0792691f314cdd8b5f69f6bce0969f30b77ce863bd2de97670f7a3ec8cc5cb6d5f1576ee29babef7a6c37b5b93b323014
-
Filesize
562KB
MD5fd238c0ed716ed40685e923bbd688312
SHA14039ff431cd19e2f8d29ffad4056375a09d11904
SHA256403a92e52243258eff6eb38f03d84048e16bc7a2b265e0968a310bdc69accede
SHA512319696d81f4f9acd8d19d6a5a6097ab0792691f314cdd8b5f69f6bce0969f30b77ce863bd2de97670f7a3ec8cc5cb6d5f1576ee29babef7a6c37b5b93b323014