Analysis
-
max time kernel
100s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 15:06
Static task
static1
Behavioral task
behavioral1
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win10v2004-20220721-en
General
-
Target
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
-
Size
504KB
-
MD5
617f1eb252543b7128c058d8e379086b
-
SHA1
704ff32daf0438df76eca57067eb8f075d2bcc28
-
SHA256
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
SHA512
1c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
Malware Config
Extracted
netwire
icf-fx.serveirc.com:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
kVTnVlks
-
offline_keylogger
true
-
password
goodluck
-
registry_autorun
true
-
startup_name
Windows Defender
-
use_mutex
true
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/984-58-0x0000000000000000-mapping.dmp netwire behavioral1/memory/984-59-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/984-62-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/984-66-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1992-72-0x0000000000000000-mapping.dmp netwire behavioral1/memory/1992-76-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1992-77-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 900 Host.exe 1992 Host.exe -
Deletes itself 1 IoCs
Processes:
Host.exepid process 1992 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exepid process 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exeHost.exepid process 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 900 Host.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exeHost.exedescription pid process target process PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 1480 wrote to memory of 984 1480 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 984 wrote to memory of 900 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 984 wrote to memory of 900 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 984 wrote to memory of 900 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 984 wrote to memory of 900 984 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe PID 900 wrote to memory of 1992 900 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc