Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2022 21:16
Static task
static1
Behavioral task
behavioral1
Sample
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe
Resource
win10v2004-20220718-en
General
-
Target
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe
-
Size
740KB
-
MD5
a1b23f02659dab7b195e78a08d5847ca
-
SHA1
8a51e9c00629ded57754e400d6344c018ab0183a
-
SHA256
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
-
SHA512
227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05
Malware Config
Extracted
netwire
amz1.hackermind.info:3360
-
activex_autorun
true
-
activex_key
{O5IC1RX5-17QA-4B21-K563-M1NR4O07C3VQ}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3448-133-0x0000000000000000-mapping.dmp netwire behavioral2/memory/3448-134-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3448-136-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3448-140-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1860-143-0x0000000000000000-mapping.dmp netwire behavioral2/memory/1860-146-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1860-147-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 4620 Host.exe 1860 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{O5IC1RX5-17QA-4B21-K563-M1NR4O07C3VQ} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{O5IC1RX5-17QA-4B21-K563-M1NR4O07C3VQ}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exeHost.exepid process 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 4620 Host.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exeHost.exedescription pid process target process PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 2688 wrote to memory of 3448 2688 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe PID 3448 wrote to memory of 4620 3448 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe Host.exe PID 3448 wrote to memory of 4620 3448 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe Host.exe PID 3448 wrote to memory of 4620 3448 50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe PID 4620 wrote to memory of 1860 4620 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\50ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740KB
MD5a1b23f02659dab7b195e78a08d5847ca
SHA18a51e9c00629ded57754e400d6344c018ab0183a
SHA25650ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
SHA512227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05
-
Filesize
740KB
MD5a1b23f02659dab7b195e78a08d5847ca
SHA18a51e9c00629ded57754e400d6344c018ab0183a
SHA25650ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
SHA512227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05
-
Filesize
740KB
MD5a1b23f02659dab7b195e78a08d5847ca
SHA18a51e9c00629ded57754e400d6344c018ab0183a
SHA25650ac1329dbc10441a42cfb745392c68a022bda8ef5ffbe29a65cbb801672a058
SHA512227b9753bda1d150b287fc4da824416e266aadc35212a037eb4665cb9895c267c07fc3be3505039136832a08c93ac03ea28b7a22e3ba7a0a1f94f052a4a99d05