Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 01:20
Static task
static1
Behavioral task
behavioral1
Sample
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe
Resource
win10v2004-20220414-en
General
-
Target
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe
-
Size
780KB
-
MD5
24bc8e6bea3028f45e8862a845a2ee9b
-
SHA1
6d31f6ca00d355fe8dc779b377a0f1a7ce677970
-
SHA256
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
-
SHA512
2c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90
Malware Config
Extracted
netwire
127.0.0.1:3360
192.3.24.231:3360
-
activex_autorun
true
-
activex_key
{W41B645X-8AWL-1GUS-6R75-0DDXP4YA48S8}
-
copy_executable
true
-
delete_original
false
-
host_id
wolla
-
install_path
%AppData%\Windowsmedialites\windowsdfender.exe
-
keylogger_dir
%AppData%\Mediaupdater\
-
lock_executable
false
-
mutex
PLwAEmqL
-
offline_keylogger
true
-
password
Zynova@56070
-
registry_autorun
true
-
startup_name
windowsdfender
-
use_mutex
true
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/264-133-0x0000000000000000-mapping.dmp netwire behavioral2/memory/264-135-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/264-136-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/264-139-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3996-143-0x0000000000000000-mapping.dmp netwire behavioral2/memory/3996-147-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
windowsdfender.exewindowsdfender.exepid process 376 windowsdfender.exe 3996 windowsdfender.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{W41B645X-8AWL-1GUS-6R75-0DDXP4YA48S8} windowsdfender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{W41B645X-8AWL-1GUS-6R75-0DDXP4YA48S8}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windowsmedialites\\windowsdfender.exe\"" windowsdfender.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ windowsdfender.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windowsdfender = "C:\\Users\\Admin\\AppData\\Roaming\\Windowsmedialites\\windowsdfender.exe" windowsdfender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exewindowsdfender.exepid process 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 376 windowsdfender.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exewindowsdfender.exedescription pid process target process PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 3856 wrote to memory of 264 3856 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe PID 264 wrote to memory of 376 264 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe windowsdfender.exe PID 264 wrote to memory of 376 264 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe windowsdfender.exe PID 264 wrote to memory of 376 264 507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe PID 376 wrote to memory of 3996 376 windowsdfender.exe windowsdfender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe"C:\Users\Admin\AppData\Local\Temp\507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe"C:\Users\Admin\AppData\Local\Temp\507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Roaming\Windowsmedialites\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\Windowsmedialites\windowsdfender.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\Windowsmedialites\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\Windowsmedialites\windowsdfender.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:3996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD524bc8e6bea3028f45e8862a845a2ee9b
SHA16d31f6ca00d355fe8dc779b377a0f1a7ce677970
SHA256507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
SHA5122c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90
-
Filesize
780KB
MD524bc8e6bea3028f45e8862a845a2ee9b
SHA16d31f6ca00d355fe8dc779b377a0f1a7ce677970
SHA256507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
SHA5122c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90
-
Filesize
780KB
MD524bc8e6bea3028f45e8862a845a2ee9b
SHA16d31f6ca00d355fe8dc779b377a0f1a7ce677970
SHA256507cdb533ae17e2796a585b6c6cbb8b2e116fae2dc26209799df93333d40a0c1
SHA5122c09d97b9034f33ed57292b2e5cd546745be725f3529007b04ba70c5057433d4011be4bbd90c483b8cc11a6e0d716cbe72338b36336a796d0b72d01437300e90