Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-07-2022 02:33

General

  • Target

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe

  • Size

    935KB

  • MD5

    8a8730a80f703191573763ef36cfa582

  • SHA1

    14a03c871c60459343c6be5d160af9482dc64990

  • SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

  • SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

Malware Config

Signatures

  • NetWire RAT payload 6 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
    "C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
      "C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\712257" "C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
        "C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1308
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            "C:\Users\Admin\AppData\Roaming\Install\Host.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\531595" "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\Users\Admin\AppData\Roaming\Install\Host.exe
              "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
              6⤵
              • Executes dropped EXE
              PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\531595

    Filesize

    15KB

    MD5

    b4b6e1a5e7180978de200c580cf1d734

    SHA1

    fa8a97514052d19f61f04fc172d7b6b761e1de0e

    SHA256

    7f4b0ec03a904819fbfa82854db369f9f16d689aea1f582f0a5c984102c997c2

    SHA512

    17368a053229f7e7602f4db05ff8a1f73e911043d88b52cb7b88143abf8f689ac5aa8288e46a04f31e67be0a5cb34c6f1cd64155ed1ba09974684e089c224f0f

  • C:\Users\Admin\AppData\Local\Temp\712257

    Filesize

    15KB

    MD5

    b4b6e1a5e7180978de200c580cf1d734

    SHA1

    fa8a97514052d19f61f04fc172d7b6b761e1de0e

    SHA256

    7f4b0ec03a904819fbfa82854db369f9f16d689aea1f582f0a5c984102c997c2

    SHA512

    17368a053229f7e7602f4db05ff8a1f73e911043d88b52cb7b88143abf8f689ac5aa8288e46a04f31e67be0a5cb34c6f1cd64155ed1ba09974684e089c224f0f

  • C:\Users\Admin\AppData\Local\Temp\incl1

    Filesize

    12KB

    MD5

    fcaa757b4fc32b9c0c66fe31b0de5376

    SHA1

    472bc2e27449278786857bfe609c868127606c3f

    SHA256

    c413b175de5a10cc23eff47d24279b269b3caf5e45d0f1de1ca645c4381fbac9

    SHA512

    ef6186305b43fc0e42cebaac82f123b83be7077a5dd1004bb9b4f82c95da57230b35a24f787ee8e63ed397e91660cfb40c1338f69c68bc7dbce381b53fe4f61c

  • C:\Users\Admin\AppData\Local\Temp\incl1

    Filesize

    12KB

    MD5

    fcaa757b4fc32b9c0c66fe31b0de5376

    SHA1

    472bc2e27449278786857bfe609c868127606c3f

    SHA256

    c413b175de5a10cc23eff47d24279b269b3caf5e45d0f1de1ca645c4381fbac9

    SHA512

    ef6186305b43fc0e42cebaac82f123b83be7077a5dd1004bb9b4f82c95da57230b35a24f787ee8e63ed397e91660cfb40c1338f69c68bc7dbce381b53fe4f61c

  • C:\Users\Admin\AppData\Local\Temp\incl2

    Filesize

    81KB

    MD5

    4e76352622ea62b29ade0aaad1dd0bef

    SHA1

    cb5600c7efbf41307e7aa0113426584a3cedcdd6

    SHA256

    5657ec0860a803483e999ee839c70cbcc79a9f9f1c6b72a2cd9f397f12f57d23

    SHA512

    93201e9b209ad70ec002d264a78d2b6e43a497b99b3d03e448d7403efd278d71f0a319741631b695ad87fb76469ce03fb7f4f2e4976946842a5f5cbf62e41ff3

  • C:\Users\Admin\AppData\Local\Temp\incl2

    Filesize

    81KB

    MD5

    4e76352622ea62b29ade0aaad1dd0bef

    SHA1

    cb5600c7efbf41307e7aa0113426584a3cedcdd6

    SHA256

    5657ec0860a803483e999ee839c70cbcc79a9f9f1c6b72a2cd9f397f12f57d23

    SHA512

    93201e9b209ad70ec002d264a78d2b6e43a497b99b3d03e448d7403efd278d71f0a319741631b695ad87fb76469ce03fb7f4f2e4976946842a5f5cbf62e41ff3

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • \Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • \Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    935KB

    MD5

    8a8730a80f703191573763ef36cfa582

    SHA1

    14a03c871c60459343c6be5d160af9482dc64990

    SHA256

    4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106

    SHA512

    ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1

  • memory/964-55-0x0000000000000000-mapping.dmp

  • memory/1308-68-0x0000000000000000-mapping.dmp

  • memory/1392-69-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1392-66-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1392-63-0x0000000000402196-mapping.dmp

  • memory/1392-62-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1392-60-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1416-54-0x00000000764C1000-0x00000000764C3000-memory.dmp

    Filesize

    8KB

  • memory/1868-74-0x0000000000000000-mapping.dmp

  • memory/2044-83-0x0000000000402196-mapping.dmp

  • memory/2044-88-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB