Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
17/07/2022, 01:28
Behavioral task
behavioral1
Sample
52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe
Resource
win10v2004-20220414-en
General
-
Target
52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe
-
Size
89KB
-
MD5
60ac7ad7eccc1cdc8e2fcd21cf42e068
-
SHA1
0d1b45bcbdbd9699bde81e984edbac26e6e39b11
-
SHA256
52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869
-
SHA512
4cf4816f4587910e5541da1eb2bfc90d8281e7c11339a9708c692d7124f70b65f1fb714ff3e7e8ecb3e3cb10817a9080f313f31034c6b756f7589afbbc4a85ba
Malware Config
Extracted
netwire
178.32.72.136:3361
193.124.117.153:3360
-
activex_autorun
true
-
activex_key
{UL0J35EK-4812-5A22-5827-J02V07OJ0H4J}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Skype.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
TptENIRd
-
offline_keylogger
true
-
password
ebefob44
-
registry_autorun
true
-
startup_name
Skype
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00090000000134cf-55.dat netwire behavioral1/files/0x00090000000134cf-56.dat netwire behavioral1/files/0x00090000000134cf-58.dat netwire -
Executes dropped EXE 1 IoCs
pid Process 1968 Skype.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{UL0J35EK-4812-5A22-5827-J02V07OJ0H4J} Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{UL0J35EK-4812-5A22-5827-J02V07OJ0H4J}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Skype.exe\"" Skype.exe -
Deletes itself 1 IoCs
pid Process 1968 Skype.exe -
Loads dropped DLL 2 IoCs
pid Process 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Skype.exe" Skype.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1968 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe 27 PID 1056 wrote to memory of 1968 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe 27 PID 1056 wrote to memory of 1968 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe 27 PID 1056 wrote to memory of 1968 1056 52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe"C:\Users\Admin\AppData\Local\Temp\52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\Install\Skype.exe-m "C:\Users\Admin\AppData\Local\Temp\52ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869.exe"2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Deletes itself
- Adds Run key to start application
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD560ac7ad7eccc1cdc8e2fcd21cf42e068
SHA10d1b45bcbdbd9699bde81e984edbac26e6e39b11
SHA25652ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869
SHA5124cf4816f4587910e5541da1eb2bfc90d8281e7c11339a9708c692d7124f70b65f1fb714ff3e7e8ecb3e3cb10817a9080f313f31034c6b756f7589afbbc4a85ba
-
Filesize
89KB
MD560ac7ad7eccc1cdc8e2fcd21cf42e068
SHA10d1b45bcbdbd9699bde81e984edbac26e6e39b11
SHA25652ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869
SHA5124cf4816f4587910e5541da1eb2bfc90d8281e7c11339a9708c692d7124f70b65f1fb714ff3e7e8ecb3e3cb10817a9080f313f31034c6b756f7589afbbc4a85ba
-
Filesize
89KB
MD560ac7ad7eccc1cdc8e2fcd21cf42e068
SHA10d1b45bcbdbd9699bde81e984edbac26e6e39b11
SHA25652ebeec6271770d72e3f2ed73535cd4a9b4d614e8877bd52a777b5f23d492869
SHA5124cf4816f4587910e5541da1eb2bfc90d8281e7c11339a9708c692d7124f70b65f1fb714ff3e7e8ecb3e3cb10817a9080f313f31034c6b756f7589afbbc4a85ba