Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe
Resource
win7-20220718-en
General
-
Target
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe
-
Size
516KB
-
MD5
a746793b906c5355212819c537d95d4a
-
SHA1
b15cb2d0cb40f036f687fdabddeb54cd31c112e4
-
SHA256
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
-
SHA512
0df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
Malware Config
Extracted
netwire
185.165.153.135:9539
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/832-63-0x0000000000400000-0x0000000000482000-memory.dmp netwire behavioral1/memory/832-64-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/772-87-0x0000000000400000-0x0000000000482000-memory.dmp netwire behavioral1/memory/772-88-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1096 Host.exe 772 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exepid process 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exedescription pid process target process PID 1644 set thread context of 832 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 1096 set thread context of 772 1096 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exepid process 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 1096 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exedescription pid process target process PID 1644 wrote to memory of 832 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 1644 wrote to memory of 832 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 1644 wrote to memory of 832 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 1644 wrote to memory of 832 1644 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 832 wrote to memory of 1096 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 832 wrote to memory of 1096 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 832 wrote to memory of 1096 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 832 wrote to memory of 1096 832 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 1096 wrote to memory of 772 1096 Host.exe Host.exe PID 1096 wrote to memory of 772 1096 Host.exe Host.exe PID 1096 wrote to memory of 772 1096 Host.exe Host.exe PID 1096 wrote to memory of 772 1096 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeC:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
PID:772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f