Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 00:11

General

  • Target

    9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe

  • Size

    1.1MB

  • MD5

    061dc947f87b44a8e531a4c6038ce9d6

  • SHA1

    0892589b478df6ffba31e3d021e2b8c55dd81651

  • SHA256

    9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328

  • SHA512

    1bd471f606bdabf0b3f4af1aca75a22c565cf4043b410433643f7d4a6665af870159beb23428f148a4b27d2c5761f5d415ce533f2af96081d9147196f3314a2b

Malware Config

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
    "C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\TapiUnattend.exe
        "C:\Windows\System32\TapiUnattend.exe"
        3⤵
          PID:1728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxx.bmp

      Filesize

      551KB

      MD5

      29b5bdc4be65fd95d737bb487d3103f1

      SHA1

      b96a29beeecd961767e9abe347a508cd474e2e01

      SHA256

      362175b76e4911263aefa81858b0c3b4e01bf992d7a08b4cb1b160bc6d00db0c

      SHA512

      4070c975db4fff163bf3955776b3f1b00bd5cb7b9451ee0ba299ed1af5f85d9e756dd41c7a7425985543c97f49cb419ece63861597df33de6e7d27ee4f218924

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe

      Filesize

      759KB

      MD5

      88cec867d63b7562b7f0dd495c1e2aeb

      SHA1

      29c6dfe02530a851109329435b06ab1d14aa916b

      SHA256

      62f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f

      SHA512

      83ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe

      Filesize

      759KB

      MD5

      88cec867d63b7562b7f0dd495c1e2aeb

      SHA1

      29c6dfe02530a851109329435b06ab1d14aa916b

      SHA256

      62f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f

      SHA512

      83ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe

      Filesize

      759KB

      MD5

      88cec867d63b7562b7f0dd495c1e2aeb

      SHA1

      29c6dfe02530a851109329435b06ab1d14aa916b

      SHA256

      62f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f

      SHA512

      83ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe

      Filesize

      759KB

      MD5

      88cec867d63b7562b7f0dd495c1e2aeb

      SHA1

      29c6dfe02530a851109329435b06ab1d14aa916b

      SHA256

      62f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f

      SHA512

      83ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe

      Filesize

      759KB

      MD5

      88cec867d63b7562b7f0dd495c1e2aeb

      SHA1

      29c6dfe02530a851109329435b06ab1d14aa916b

      SHA256

      62f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f

      SHA512

      83ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352

    • memory/1728-65-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1728-63-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1728-66-0x0000000000402570-mapping.dmp

    • memory/1728-69-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1728-71-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1728-72-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1920-57-0x0000000000000000-mapping.dmp

    • memory/2032-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

      Filesize

      8KB