Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
18-07-2022 05:59
Static task
static1
Behavioral task
behavioral1
Sample
SVD0038847748.exe
Resource
win7-20220414-en
windows7-x64
6 signatures
150 seconds
General
-
Target
SVD0038847748.exe
-
Size
874KB
-
MD5
05ce79987f664577042435b819c74532
-
SHA1
cb1ff0222986e90b238a7020047c24fa3f85036a
-
SHA256
cf318f94ad9a7827d2cf4415549c9d3ceb92c0bae85c46e50420fbbe3fa8f3a4
-
SHA512
0d96b39f448e4eee8957cc11fba133a07378e6b68bbb1e0f0f739ecab53085611c0414eff9a41107cdc9eb4d471b37ec32f44130a005bfe285d4b8adca3629eb
Malware Config
Extracted
Family
netwire
C2
xman2.duckdns.org:4433
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/888-65-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/888-68-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/888-67-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/888-71-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/888-70-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/888-74-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/888-75-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SVD0038847748.exedescription pid process target process PID 1948 set thread context of 888 1948 SVD0038847748.exe SVD0038847748.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SVD0038847748.exepid process 1948 SVD0038847748.exe 1948 SVD0038847748.exe 1948 SVD0038847748.exe 1948 SVD0038847748.exe 1948 SVD0038847748.exe 1948 SVD0038847748.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SVD0038847748.exedescription pid process Token: SeDebugPrivilege 1948 SVD0038847748.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SVD0038847748.exedescription pid process target process PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe PID 1948 wrote to memory of 888 1948 SVD0038847748.exe SVD0038847748.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SVD0038847748.exe"C:\Users\Admin\AppData\Local\Temp\SVD0038847748.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\SVD0038847748.exe"C:\Users\Admin\AppData\Local\Temp\SVD0038847748.exe"2⤵PID:888