Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 21:09

General

  • Target

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca.exe

  • Size

    1.2MB

  • MD5

    1c1dc513c93df358bbfe566a37b32359

  • SHA1

    7281a9babd20a1a5a48ace5fdefa558603c55152

  • SHA256

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca

  • SHA512

    fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f

Malware Config

Extracted

Family

netwire

C2

pd1n.ddns.net:1968

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    pd1n-noip

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Kimbolsapoq!P12

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca.exe
    "C:\Users\Admin\AppData\Local\Temp\bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe
        "C:\Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "fgtyhjkl" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\fgtyhjkl.txt" | cmd"
            5⤵
            • Adds Run key to start application
            PID:824
        • C:\Windows\Microsoft.net\Framework\v2.0.50727\regasm.exe
          "C:\Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe"
          4⤵
          • Drops file in Windows directory
          PID:284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

    Filesize

    1KB

    MD5

    729b7bc608a61a8e50cda5b0390d9f9d

    SHA1

    57d7af72b872f219f74536288948d37429b3f993

    SHA256

    f6fd1fc70e01cf1672748312e7e8113954f23591182a6d47c5d2d12fd3a33cab

    SHA512

    288ee1e1f1a6a913ae8a4dd7c68ffaf1cc162fa42a4f00584d182628717118b106af9409da2fa98079694c8814a2d02b494bcd98a5681baede37a5b69b4f86fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

    Filesize

    1KB

    MD5

    76c66a47f75937bd0015f3dd0b59dc96

    SHA1

    48191e865350e497851cc0e77d137add1fd9bc25

    SHA256

    c4216e55a2baed168e318a5f8d5740b5f4c5dbedd226536243d4527090e59044

    SHA512

    7318040978957aa3f79bb74ef7f66368bb8a3b42b0b7eebddb847c3ab3684386b93615dc40498d3bbd858c0aa16098d73b2246dd1a3580143cd98519e1792911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

    Filesize

    398B

    MD5

    6e9faf96d98f90fd3fa3d55de7421444

    SHA1

    e04d4f7756e0a5f9c3ea8353097910fe9a5beb0f

    SHA256

    6a56f244c3c0f98226571945c56a5d0dc4b4cec47ae7350b7b267beda84f6756

    SHA512

    249bb3ae63cd39ca136398d28736f83709bc91031b8b11f39fa7c632720df0e4b1bbe36e3e294db02b372eebb7b5322870d58e8c0e7a8d6ff9ac71cf95fbb672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

    Filesize

    392B

    MD5

    0efa2d13f407496d9f3a0a7066c0b33b

    SHA1

    7fc6412bd470b7d9bedf1a8938de22478a0b177d

    SHA256

    b3df7d268c764c2c5c61a24256553c158e70a854e21b3a825bb6cac49fac3664

    SHA512

    eca5795e8b658e54a5eb4fd099ae47cca3708bbbe5a4698e03b1ad025ebe8270f1238b9cb4a3a4ddf7343ec8bef55bef08264dd77373a88aa73fb88e5b09d433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    3c152d0994aa4f15932504eea84d1dc0

    SHA1

    31b7a7cc096e7860bacc754b1025c36859fb7dc2

    SHA256

    45da75d98b920ff624feb75721127ab510808ae77ac8610ef4357e4293b35f39

    SHA512

    215e123c4517d6d4bf01b113285bbf92cbf6c1068ce20b999681e3afde8cad5ca096deb66ec458193dc4de7b0ef0a7ffdaee23e48e033008f332f5dc954ae0c6

  • C:\Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe

    Filesize

    1.2MB

    MD5

    1c1dc513c93df358bbfe566a37b32359

    SHA1

    7281a9babd20a1a5a48ace5fdefa558603c55152

    SHA256

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca

    SHA512

    fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f

  • C:\Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe

    Filesize

    1.2MB

    MD5

    1c1dc513c93df358bbfe566a37b32359

    SHA1

    7281a9babd20a1a5a48ace5fdefa558603c55152

    SHA256

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca

    SHA512

    fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f

  • \Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe

    Filesize

    1.2MB

    MD5

    1c1dc513c93df358bbfe566a37b32359

    SHA1

    7281a9babd20a1a5a48ace5fdefa558603c55152

    SHA256

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca

    SHA512

    fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f

  • \Users\Admin\AppData\Roaming\yutghbncxsdz\sderwqfvgb.exe

    Filesize

    1.2MB

    MD5

    1c1dc513c93df358bbfe566a37b32359

    SHA1

    7281a9babd20a1a5a48ace5fdefa558603c55152

    SHA256

    bea60e5ba81781d9ce1b148dcd77412da965d93730bf8f2608c7b077f07e68ca

    SHA512

    fa2fc9eff890657501ea9c627dd107c17a5b077bd46369bf73cf74056b372baa2790dcad2461fc899f55e0e4445eceebd9d32cc06c7c393d97841ff77e369a0f

  • memory/284-79-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-72-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-73-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-86-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-84-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-75-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/284-80-0x00000000004022CA-mapping.dmp

  • memory/284-77-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/824-71-0x0000000000000000-mapping.dmp

  • memory/944-56-0x0000000000000000-mapping.dmp

  • memory/1208-69-0x0000000074C30000-0x00000000751DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1208-60-0x0000000000000000-mapping.dmp

  • memory/1208-83-0x0000000074C30000-0x00000000751DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1624-55-0x0000000074C30000-0x00000000751DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1624-63-0x0000000074C30000-0x00000000751DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1624-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB

  • memory/1760-70-0x0000000000000000-mapping.dmp