Analysis
-
max time kernel
112s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 15:06
Static task
static1
Behavioral task
behavioral1
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
Resource
win10v2004-20220721-en
General
-
Target
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe
-
Size
504KB
-
MD5
617f1eb252543b7128c058d8e379086b
-
SHA1
704ff32daf0438df76eca57067eb8f075d2bcc28
-
SHA256
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
-
SHA512
1c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
Malware Config
Extracted
netwire
icf-fx.serveirc.com:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
kVTnVlks
-
offline_keylogger
true
-
password
goodluck
-
registry_autorun
true
-
startup_name
Windows Defender
-
use_mutex
true
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/4316-133-0x0000000000000000-mapping.dmp netwire behavioral2/memory/4316-134-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4316-136-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4316-139-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4320-143-0x0000000000000000-mapping.dmp netwire behavioral2/memory/4320-146-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4320-147-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 3452 Host.exe 4320 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exeHost.exepid process 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 3452 Host.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exeHost.exedescription pid process target process PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 5028 wrote to memory of 4316 5028 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe PID 4316 wrote to memory of 3452 4316 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 4316 wrote to memory of 3452 4316 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 4316 wrote to memory of 3452 4316 586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe PID 3452 wrote to memory of 4320 3452 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc
-
Filesize
504KB
MD5617f1eb252543b7128c058d8e379086b
SHA1704ff32daf0438df76eca57067eb8f075d2bcc28
SHA256586106033926906094e642024539cd21cd62df0887ce50ebf1e5bbd1c7c2ec3c
SHA5121c39b2f0686e8fc6cbe6c45049f7f40a7fa55571adf67edb16b824bf8610d6f240feff95e2a33e8433647e337a944f7e3e22d41d88c4f1cb1565013a5bc3b7dc