Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2022 18:45

General

  • Target

    Confirmation invoice.exe

  • Size

    985KB

  • MD5

    2858ed17f31e92fd777b63215aec5d19

  • SHA1

    f943f44864f6dee7e7fc0c1e6164beb9d1aaf3f6

  • SHA256

    ceddfa857ec809f2cfc3fd8168ec767f522bcb059c4448bbf662c83db8c0501c

  • SHA512

    50257e958cd6b8168c152c04a1dd3ca09c94fb44c5d7e15b20e46d2432bb1ab9db4454e55188fc0b84bd1de83976e3785ef29dd7d0edec3a0bf74155a5dabd53

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:3363

185.140.53.61:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    move4ward

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 9 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Confirmation invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\Confirmation invoice.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GbfIgrRRRDmAK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp98A8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\Confirmation invoice.exe
      "{path}"
      2⤵
        PID:1316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp98A8.tmp

      Filesize

      1KB

      MD5

      6e48944873ba02621c06e09e83a6d43b

      SHA1

      9036bfc4a7b79f83274b5bbb04d9208d33499ad7

      SHA256

      4ead6618c213758678455b01720dbe76728b0386aee9ce1d41f0d96b0ff8f607

      SHA512

      b34cc793113979dedba6e3cc742c3867b3564ea3732efe85922838f19ab7a478b29dba616fbd175ae5dd2beaaf73627d0ab8a5ebd02f3f701e23bc916456ad80

    • memory/668-55-0x0000000076031000-0x0000000076033000-memory.dmp

      Filesize

      8KB

    • memory/668-56-0x0000000000410000-0x000000000041A000-memory.dmp

      Filesize

      40KB

    • memory/668-57-0x00000000052C0000-0x000000000533C000-memory.dmp

      Filesize

      496KB

    • memory/668-58-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

      Filesize

      184KB

    • memory/668-54-0x0000000000290000-0x000000000038C000-memory.dmp

      Filesize

      1008KB

    • memory/1316-62-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-61-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-64-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-66-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-67-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-68-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-70-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-72-0x000000000040242D-mapping.dmp

    • memory/1316-71-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-75-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-76-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-77-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1980-59-0x0000000000000000-mapping.dmp