Analysis

  • max time kernel
    51s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 19:43

General

  • Target

    57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe

  • Size

    196KB

  • MD5

    40af2d46b77bcdc84924c5b6a29bfe2d

  • SHA1

    8ff1371ddd1fc3839c06d4cc1f86166873a6c726

  • SHA256

    57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

  • SHA512

    860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

Malware Config

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
    "C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
      "C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"
      2⤵
        PID:844
      • C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
        "C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          3⤵
          • Executes dropped EXE
          PID:560

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      196KB

      MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

      SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

      SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

      SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      196KB

      MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

      SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

      SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

      SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • \Users\Admin\AppData\Roaming\CbgAJgP\WflrmsAYJC.exe

      Filesize

      196KB

      MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

      SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

      SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

      SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • \Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      196KB

      MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

      SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

      SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

      SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • \Users\Admin\AppData\Roaming\Install\Host.exe

      Filesize

      196KB

      MD5

      40af2d46b77bcdc84924c5b6a29bfe2d

      SHA1

      8ff1371ddd1fc3839c06d4cc1f86166873a6c726

      SHA256

      57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201

      SHA512

      860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46

    • memory/560-76-0x0000000074060000-0x000000007460B000-memory.dmp

      Filesize

      5.7MB

    • memory/560-75-0x0000000074060000-0x000000007460B000-memory.dmp

      Filesize

      5.7MB

    • memory/560-70-0x0000000000000000-mapping.dmp

    • memory/848-59-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-67-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-63-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-64-0x00000000004021DA-mapping.dmp

    • memory/848-61-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-72-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-57-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/848-56-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1008-54-0x0000000074D61000-0x0000000074D63000-memory.dmp

      Filesize

      8KB

    • memory/1008-77-0x0000000074060000-0x000000007460B000-memory.dmp

      Filesize

      5.7MB

    • memory/1008-55-0x0000000074060000-0x000000007460B000-memory.dmp

      Filesize

      5.7MB