Analysis
-
max time kernel
51s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
Resource
win7-20220718-en
General
-
Target
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
-
Size
196KB
-
MD5
40af2d46b77bcdc84924c5b6a29bfe2d
-
SHA1
8ff1371ddd1fc3839c06d4cc1f86166873a6c726
-
SHA256
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
SHA512
860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/848-61-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/848-64-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/848-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/848-67-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/848-72-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 560 Host.exe -
Drops startup file 1 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nlomdNielECE.lnk 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Loads dropped DLL 3 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exepid process 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription pid process target process PID 1008 set thread context of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exepid process 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription pid process Token: SeDebugPrivilege 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription pid process target process PID 1008 wrote to memory of 844 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 844 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 844 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 844 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 1008 wrote to memory of 848 1008 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 848 wrote to memory of 560 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe PID 848 wrote to memory of 560 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe PID 848 wrote to memory of 560 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe PID 848 wrote to memory of 560 848 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"2⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
PID:560
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46