Analysis
-
max time kernel
111s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
Resource
win10v2004-20220722-en
General
-
Target
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
-
Size
558KB
-
MD5
f131435dead0e37aee759622ababb51f
-
SHA1
3fb5bd52e8dc3bbc0a072ceda02255e8f9f4ea70
-
SHA256
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f
-
SHA512
a16240153654064a65c32d17f9b8e6cb75924f37547b93b47a489aaa48a69a8c442947d1f559d1b9efc51a909f96f8e23a93f1bee721e6b2e7180dfcd938552f
Malware Config
Extracted
netwire
173.46.85.16:89
-
activex_autorun
true
-
activex_key
{J418T26D-3X70-W6QE-W00F-G37EOA6W8D23}
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
fbbTJkoP
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1160-62-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1160-68-0x00000000778A0000-0x0000000077A20000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{J418T26D-3X70-W6QE-W00F-G37EOA6W8D23} 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{J418T26D-3X70-W6QE-W00F-G37EOA6W8D23}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe\"" 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe" 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exedescription pid process target process PID 1092 set thread context of 1160 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exepid process 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exepid process 1160 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exedescription pid process target process PID 1092 wrote to memory of 1160 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe PID 1092 wrote to memory of 1160 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe PID 1092 wrote to memory of 1160 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe PID 1092 wrote to memory of 1160 1092 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe 587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe"C:\Users\Admin\AppData\Local\Temp\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exeC:\Users\Admin\AppData\Local\Temp\587011c1c797b633a7dc0a2658e00a597066236c57acb0ed48abd732c9408d2f.exe"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of UnmapMainImage
PID:1160