Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 02:46
Static task
static1
Behavioral task
behavioral1
Sample
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe
Resource
win10v2004-20220414-en
General
-
Target
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe
-
Size
562KB
-
MD5
bdd639e15d8c88efe5ab1f58608a0302
-
SHA1
fd99f0cff3ebbc6254c86147096148b41aa31b5f
-
SHA256
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5
-
SHA512
880f7f2401a470c4c157659cec8b3f396233b260a1cc68d698cb0443e88bef56ddf2435e100a1c780956b5cbe5c22906024ef4a90245d1615ebf28fd67efdd85
Malware Config
Extracted
netwire
127.0.0.1:3360
elumadns.eluma101.com:4003
elumadns.eluma101.com:4000
jmoney.daniel2you.com:4000
jmoney.daniel2you.com:4003
oluwa101.hopto.org:4003
oluwa101.hopto.org:4000
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
NEWEST_2019
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
BEBSWoHf
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1756-69-0x0000000000400000-0x000000000042D000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1608 Host.exe -
Loads dropped DLL 1 IoCs
Processes:
mstsc.exepid process 1756 mstsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ms OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Macromedia\\StikyNot.exe" 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exedescription ioc process File opened for modification \??\PhysicalDrive0 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exedescription pid process target process PID 1964 set thread context of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exemstsc.exedescription pid process target process PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1964 wrote to memory of 1756 1964 5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe mstsc.exe PID 1756 wrote to memory of 1608 1756 mstsc.exe Host.exe PID 1756 wrote to memory of 1608 1756 mstsc.exe Host.exe PID 1756 wrote to memory of 1608 1756 mstsc.exe Host.exe PID 1756 wrote to memory of 1608 1756 mstsc.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe"C:\Users\Admin\AppData\Local\Temp\5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\System32\mstsc.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD568b4a549d0b56a4dd9a488751037cf09
SHA1fa7137a8cd430ffeb9e869443026dcde540dbcc2
SHA256a9286688556dbb45303d3a0e7825294f58ffd48e125518ac33ab009426c967cc
SHA512569c29845e7a82fdc9b2a483175a1674f67a553d23f61057c87d07598ba55fc1a1ad96343409b50d537886ee58b3e849d9d3b0dc8ada7f15e3de2a6a5e3fd66a
-
Filesize
1.0MB
MD568b4a549d0b56a4dd9a488751037cf09
SHA1fa7137a8cd430ffeb9e869443026dcde540dbcc2
SHA256a9286688556dbb45303d3a0e7825294f58ffd48e125518ac33ab009426c967cc
SHA512569c29845e7a82fdc9b2a483175a1674f67a553d23f61057c87d07598ba55fc1a1ad96343409b50d537886ee58b3e849d9d3b0dc8ada7f15e3de2a6a5e3fd66a