Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2022 09:07
Static task
static1
Behavioral task
behavioral1
Sample
59b5570fd782ef0503a49fd7470200b6.exe
Resource
win7-20220414-en
General
-
Target
59b5570fd782ef0503a49fd7470200b6.exe
-
Size
75KB
-
MD5
59b5570fd782ef0503a49fd7470200b6
-
SHA1
1738e6b2ecb79b85e950a9734469404002cbb195
-
SHA256
f621b17f07a862cf0dd4c87aaef881dc2a39e36f73900025169aa34c99d0a650
-
SHA512
2fd88fce69174fd1f84866ebc99e1f31e2ef8e4af4606871953d4eafa56b029f2bd039bab14c6b847368ecddab148b08bf4c28f6e820e18f14784c40a8a42135
Malware Config
Extracted
netwire
194.5.98.188:3364
194.5.98.188:3366
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
j5m52xuc
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4948-141-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4948-143-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4948-144-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
59b5570fd782ef0503a49fd7470200b6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 59b5570fd782ef0503a49fd7470200b6.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59b5570fd782ef0503a49fd7470200b6.exedescription pid process target process PID 3288 set thread context of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe59b5570fd782ef0503a49fd7470200b6.exepid process 3296 powershell.exe 3296 powershell.exe 3288 59b5570fd782ef0503a49fd7470200b6.exe 3288 59b5570fd782ef0503a49fd7470200b6.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
59b5570fd782ef0503a49fd7470200b6.exepowershell.exedescription pid process Token: SeDebugPrivilege 3288 59b5570fd782ef0503a49fd7470200b6.exe Token: SeDebugPrivilege 3296 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
59b5570fd782ef0503a49fd7470200b6.exedescription pid process target process PID 3288 wrote to memory of 3296 3288 59b5570fd782ef0503a49fd7470200b6.exe powershell.exe PID 3288 wrote to memory of 3296 3288 59b5570fd782ef0503a49fd7470200b6.exe powershell.exe PID 3288 wrote to memory of 3296 3288 59b5570fd782ef0503a49fd7470200b6.exe powershell.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe PID 3288 wrote to memory of 4948 3288 59b5570fd782ef0503a49fd7470200b6.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b5570fd782ef0503a49fd7470200b6.exe"C:\Users\Admin\AppData\Local\Temp\59b5570fd782ef0503a49fd7470200b6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4948