Analysis

  • max time kernel
    111s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2022 21:50

General

  • Target

    4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666.exe

  • Size

    414KB

  • MD5

    9c0951fb8402c355e783fa534450e119

  • SHA1

    95fd8fab4bb4fd644b1b5e21daa8fc8325702d4b

  • SHA256

    4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666

  • SHA512

    009ba5b31647471474cfe4e9859415f56fc48db902480a7e370ccd47d4dad870c92378b4dbb5ac2bc6353e63bc7f15afc768a386fa529a5cee5a7269257c6361

Malware Config

Extracted

Family

netwire

C2

profoundation.linkpc.net:3595

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Luli

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    iSoBgOVE

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 7 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666.exe
    "C:\Users\Admin\AppData\Local\Temp\4fa284b1e62959e14c8059bfad65123a34da59b3456f58987d0f40dd2f986666.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "KSYUTPN\KSYUTPN" /XML "C:\Users\Admin\AppData\Roaming\KSYUTPN\arrrrr.xml"
      2⤵
      • Creates scheduled task(s)
      PID:1404
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:1224

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\KSYUTPN\arrrrr.xml

      Filesize

      1KB

      MD5

      30de285f8a093aca3bf045e4f71636fb

      SHA1

      e17a81d401238e69e0ec3edbbd675c76b215eb3b

      SHA256

      10aa69697507e44cf1daad239f028e773952d963c5b09a9b8ff3a7c5d1be6385

      SHA512

      f374ab96e5bc6fd466be5441c9a5f3d6b20782c5bc7d371adea50fc774c4bdf8f44a10894617a55ccba743ef773542e647e9e6a2f5d18235da73ef557cf3c580

    • memory/1224-61-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-67-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-79-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-58-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-59-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-78-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-64-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-74-0x0000000000402BCB-mapping.dmp

    • memory/1224-70-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1224-72-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1404-56-0x0000000000000000-mapping.dmp

    • memory/1448-76-0x0000000074B40000-0x00000000750EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1448-54-0x0000000076601000-0x0000000076603000-memory.dmp

      Filesize

      8KB

    • memory/1448-55-0x0000000074B40000-0x00000000750EB000-memory.dmp

      Filesize

      5.7MB