Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2022 04:11

General

  • Target

    a01f958303908593960700e185621339.exe

  • Size

    592KB

  • MD5

    a01f958303908593960700e185621339

  • SHA1

    f2d77bd0ac2fc032606c36d908d46613e29ba5d3

  • SHA256

    99f632633f17babbae3446273033516839f84253e28b18f6afda1bd4e5713c2c

  • SHA512

    d294564d72f7d747c5880c045115f493b2143ec2948004b343c6c10d1ef74d5ab1e39bb73d13fd18732299cb1a577012bee030c223993ec7784c0e0d9bfef285

Malware Config

Extracted

Family

netwire

C2

logbox147.duckdns.org:3370

Attributes
  • activex_autorun

    true

  • activex_key

    {F43NBRHB-ST27-05SC-62QP-X844OXS2E107}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    MONEY

  • install_path

    %AppData%\Install\skyp.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    iiXJiIYR

  • offline_keylogger

    true

  • password

    forgood

  • registry_autorun

    true

  • startup_name

    skyp

  • use_mutex

    true

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a01f958303908593960700e185621339.exe
    "C:\Users\Admin\AppData\Local\Temp\a01f958303908593960700e185621339.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Roaming\Install\skyp.exe
      "C:\Users\Admin\AppData\Roaming\Install\skyp.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      PID:4988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Install\skyp.exe

    Filesize

    592KB

    MD5

    a01f958303908593960700e185621339

    SHA1

    f2d77bd0ac2fc032606c36d908d46613e29ba5d3

    SHA256

    99f632633f17babbae3446273033516839f84253e28b18f6afda1bd4e5713c2c

    SHA512

    d294564d72f7d747c5880c045115f493b2143ec2948004b343c6c10d1ef74d5ab1e39bb73d13fd18732299cb1a577012bee030c223993ec7784c0e0d9bfef285

  • C:\Users\Admin\AppData\Roaming\Install\skyp.exe

    Filesize

    592KB

    MD5

    a01f958303908593960700e185621339

    SHA1

    f2d77bd0ac2fc032606c36d908d46613e29ba5d3

    SHA256

    99f632633f17babbae3446273033516839f84253e28b18f6afda1bd4e5713c2c

    SHA512

    d294564d72f7d747c5880c045115f493b2143ec2948004b343c6c10d1ef74d5ab1e39bb73d13fd18732299cb1a577012bee030c223993ec7784c0e0d9bfef285

  • memory/4988-130-0x0000000000000000-mapping.dmp