Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe
Resource
win7-20220718-en
General
-
Target
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe
-
Size
516KB
-
MD5
a746793b906c5355212819c537d95d4a
-
SHA1
b15cb2d0cb40f036f687fdabddeb54cd31c112e4
-
SHA256
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
-
SHA512
0df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
Malware Config
Extracted
netwire
185.165.153.135:9539
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4088-137-0x0000000000400000-0x0000000000482000-memory.dmp netwire behavioral2/memory/4088-138-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1580 Host.exe 4940 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exedescription pid process target process PID 3316 set thread context of 4088 3316 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 1580 set thread context of 4940 1580 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exepid process 3316 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 1580 Host.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeHost.exedescription pid process target process PID 3316 wrote to memory of 4088 3316 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 3316 wrote to memory of 4088 3316 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 3316 wrote to memory of 4088 3316 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe PID 4088 wrote to memory of 1580 4088 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 4088 wrote to memory of 1580 4088 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 4088 wrote to memory of 1580 4088 4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe Host.exe PID 1580 wrote to memory of 4940 1580 Host.exe Host.exe PID 1580 wrote to memory of 4940 1580 Host.exe Host.exe PID 1580 wrote to memory of 4940 1580 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exeC:\Users\Admin\AppData\Local\Temp\4f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
PID:4940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f
-
Filesize
516KB
MD5a746793b906c5355212819c537d95d4a
SHA1b15cb2d0cb40f036f687fdabddeb54cd31c112e4
SHA2564f6b90f9d4b48278766883d445a0e5f8e6ac7b26c89e4788d89ff0a651e89a3e
SHA5120df708298b080413d39737686b89233d2c21262bbce001884cbf0f4dcd449931d1635f70e5c188c14e49ec687c59a3337d7916ee5cd76617b225e39d975a515f