Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 12:10

General

  • Target

    ORDER AND SPECIFICATION.exe

  • Size

    837KB

  • MD5

    794c05af4df48c2a3342479fdc4315f8

  • SHA1

    8e4ede8625df7a8df66a25f1db9dab4322c1132e

  • SHA256

    4abbdb512ff25db431e9bca0ad5d65a823087139f2a33078d7bcb1282880d979

  • SHA512

    75bffee8ab66b2bc55dedbbb9d8f9dde9749736dc31f75bb80aa1709613e3a9463c4c2a233a2157f158f1aed3ec7ec740f497b8b8bc69850517214084753f5e0

Malware Config

Extracted

Family

netwire

C2

37.0.14.203:3083

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Elibee88

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATION.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATION.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DOKnTYKItugWOC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3720
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DOKnTYKItugWOC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA73C.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:540
    • C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATION.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATION.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DOKnTYKItugWOC.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DOKnTYKItugWOC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA999.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:3412
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          PID:3880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 1776
          4⤵
          • Program crash
          PID:2080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1788
      2⤵
      • Program crash
      PID:3016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4052 -ip 4052
    1⤵
      PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4520 -ip 4520
      1⤵
        PID:4568

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        968cb9309758126772781b83adb8a28f

        SHA1

        8da30e71accf186b2ba11da1797cf67f8f78b47c

        SHA256

        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

        SHA512

        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        b20233211b0f307dcae3490cc232bb28

        SHA1

        c76c4d9aa789af33beb5db628aa36188308d2452

        SHA256

        43290a97af708d5e245e54eb4a43d5c330586139569c5911665c226f26a46469

        SHA512

        fc7865823356e5be412b05809e587940d45bc70b43e9988e56634b13a3787a3a294f60844ffdd3971e17969f8f0742db6f4018a74613a801e16c008330a37178

      • C:\Users\Admin\AppData\Local\Temp\tmpA73C.tmp

        Filesize

        1KB

        MD5

        5976d492f1676c6ed348583832db5bff

        SHA1

        6e87c4264880246921370acf0509bd7ad9ac9221

        SHA256

        43f8d2c7fb2723fffc89b1b30dc364028f3d3d66103e0b7fcc870fe07c0175d0

        SHA512

        ca8c362432841b3f7adced06b019d79de3979f497c36ef5775018e128f47acd61406e923e68534cff888540ac9d1c968930ddcf1e60af4f134cc1841a742d184

      • C:\Users\Admin\AppData\Local\Temp\tmpA999.tmp

        Filesize

        1KB

        MD5

        5976d492f1676c6ed348583832db5bff

        SHA1

        6e87c4264880246921370acf0509bd7ad9ac9221

        SHA256

        43f8d2c7fb2723fffc89b1b30dc364028f3d3d66103e0b7fcc870fe07c0175d0

        SHA512

        ca8c362432841b3f7adced06b019d79de3979f497c36ef5775018e128f47acd61406e923e68534cff888540ac9d1c968930ddcf1e60af4f134cc1841a742d184

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        837KB

        MD5

        794c05af4df48c2a3342479fdc4315f8

        SHA1

        8e4ede8625df7a8df66a25f1db9dab4322c1132e

        SHA256

        4abbdb512ff25db431e9bca0ad5d65a823087139f2a33078d7bcb1282880d979

        SHA512

        75bffee8ab66b2bc55dedbbb9d8f9dde9749736dc31f75bb80aa1709613e3a9463c4c2a233a2157f158f1aed3ec7ec740f497b8b8bc69850517214084753f5e0

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        837KB

        MD5

        794c05af4df48c2a3342479fdc4315f8

        SHA1

        8e4ede8625df7a8df66a25f1db9dab4322c1132e

        SHA256

        4abbdb512ff25db431e9bca0ad5d65a823087139f2a33078d7bcb1282880d979

        SHA512

        75bffee8ab66b2bc55dedbbb9d8f9dde9749736dc31f75bb80aa1709613e3a9463c4c2a233a2157f158f1aed3ec7ec740f497b8b8bc69850517214084753f5e0

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        837KB

        MD5

        794c05af4df48c2a3342479fdc4315f8

        SHA1

        8e4ede8625df7a8df66a25f1db9dab4322c1132e

        SHA256

        4abbdb512ff25db431e9bca0ad5d65a823087139f2a33078d7bcb1282880d979

        SHA512

        75bffee8ab66b2bc55dedbbb9d8f9dde9749736dc31f75bb80aa1709613e3a9463c4c2a233a2157f158f1aed3ec7ec740f497b8b8bc69850517214084753f5e0

      • memory/540-137-0x0000000000000000-mapping.dmp

      • memory/748-150-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/748-141-0x0000000000000000-mapping.dmp

      • memory/748-142-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/748-145-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2460-162-0x0000000000000000-mapping.dmp

      • memory/2460-173-0x00000000705D0000-0x000000007061C000-memory.dmp

        Filesize

        304KB

      • memory/3412-163-0x0000000000000000-mapping.dmp

      • memory/3720-151-0x00000000063B0000-0x00000000063CE000-memory.dmp

        Filesize

        120KB

      • memory/3720-159-0x00000000078F0000-0x00000000078FE000-memory.dmp

        Filesize

        56KB

      • memory/3720-146-0x00000000054B0000-0x0000000005516000-memory.dmp

        Filesize

        408KB

      • memory/3720-144-0x0000000005410000-0x0000000005432000-memory.dmp

        Filesize

        136KB

      • memory/3720-140-0x00000000055C0000-0x0000000005BE8000-memory.dmp

        Filesize

        6.2MB

      • memory/3720-136-0x0000000000000000-mapping.dmp

      • memory/3720-152-0x0000000007370000-0x00000000073A2000-memory.dmp

        Filesize

        200KB

      • memory/3720-153-0x00000000705D0000-0x000000007061C000-memory.dmp

        Filesize

        304KB

      • memory/3720-154-0x0000000006970000-0x000000000698E000-memory.dmp

        Filesize

        120KB

      • memory/3720-155-0x0000000007D00000-0x000000000837A000-memory.dmp

        Filesize

        6.5MB

      • memory/3720-156-0x00000000076C0000-0x00000000076DA000-memory.dmp

        Filesize

        104KB

      • memory/3720-157-0x0000000007730000-0x000000000773A000-memory.dmp

        Filesize

        40KB

      • memory/3720-158-0x0000000007940000-0x00000000079D6000-memory.dmp

        Filesize

        600KB

      • memory/3720-138-0x0000000004DE0000-0x0000000004E16000-memory.dmp

        Filesize

        216KB

      • memory/3720-160-0x0000000007A00000-0x0000000007A1A000-memory.dmp

        Filesize

        104KB

      • memory/3720-161-0x00000000079E0000-0x00000000079E8000-memory.dmp

        Filesize

        32KB

      • memory/3880-166-0x0000000000000000-mapping.dmp

      • memory/3880-170-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3880-172-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4052-130-0x00000000005F0000-0x00000000006C6000-memory.dmp

        Filesize

        856KB

      • memory/4052-135-0x000000000B6A0000-0x000000000B706000-memory.dmp

        Filesize

        408KB

      • memory/4052-134-0x0000000008980000-0x0000000008A1C000-memory.dmp

        Filesize

        624KB

      • memory/4052-133-0x0000000005120000-0x000000000512A000-memory.dmp

        Filesize

        40KB

      • memory/4052-132-0x0000000004F50000-0x0000000004FE2000-memory.dmp

        Filesize

        584KB

      • memory/4052-131-0x0000000005500000-0x0000000005AA4000-memory.dmp

        Filesize

        5.6MB

      • memory/4520-147-0x0000000000000000-mapping.dmp