Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 02:00
Static task
static1
Behavioral task
behavioral1
Sample
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe
Resource
win10v2004-20220721-en
General
-
Target
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe
-
Size
504KB
-
MD5
2cdb34bbad1c2a4c0e59eed11f281dd5
-
SHA1
de053e546a00c8cb152711ff49b0e633b9f65c74
-
SHA256
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
-
SHA512
220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190
Malware Config
Extracted
netwire
178.124.140.150:8687
-
activex_autorun
true
-
activex_key
{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-63-0x0000000000400000-0x000000000048B000-memory.dmp netwire behavioral1/memory/1812-64-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2000-87-0x0000000000400000-0x000000000048B000-memory.dmp netwire behavioral1/memory/2000-88-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 948 Host.exe 2000 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 2 IoCs
Processes:
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exepid process 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exeHost.exedescription pid process target process PID 1976 set thread context of 1812 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe PID 948 set thread context of 2000 948 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exeHost.exepid process 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 948 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exeHost.exedescription pid process target process PID 1976 wrote to memory of 1812 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe PID 1976 wrote to memory of 1812 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe PID 1976 wrote to memory of 1812 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe PID 1976 wrote to memory of 1812 1976 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe PID 1812 wrote to memory of 948 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe Host.exe PID 1812 wrote to memory of 948 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe Host.exe PID 1812 wrote to memory of 948 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe Host.exe PID 1812 wrote to memory of 948 1812 56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe Host.exe PID 948 wrote to memory of 2000 948 Host.exe Host.exe PID 948 wrote to memory of 2000 948 Host.exe Host.exe PID 948 wrote to memory of 2000 948 Host.exe Host.exe PID 948 wrote to memory of 2000 948 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe"C:\Users\Admin\AppData\Local\Temp\56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exeC:\Users\Admin\AppData\Local\Temp\56aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD52cdb34bbad1c2a4c0e59eed11f281dd5
SHA1de053e546a00c8cb152711ff49b0e633b9f65c74
SHA25656aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
SHA512220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190
-
Filesize
504KB
MD52cdb34bbad1c2a4c0e59eed11f281dd5
SHA1de053e546a00c8cb152711ff49b0e633b9f65c74
SHA25656aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
SHA512220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190
-
Filesize
504KB
MD52cdb34bbad1c2a4c0e59eed11f281dd5
SHA1de053e546a00c8cb152711ff49b0e633b9f65c74
SHA25656aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
SHA512220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190
-
Filesize
504KB
MD52cdb34bbad1c2a4c0e59eed11f281dd5
SHA1de053e546a00c8cb152711ff49b0e633b9f65c74
SHA25656aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
SHA512220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190
-
Filesize
504KB
MD52cdb34bbad1c2a4c0e59eed11f281dd5
SHA1de053e546a00c8cb152711ff49b0e633b9f65c74
SHA25656aff5f89acbf221f7e5102a768d74c707da738b0edc7d0e90c6a1f15d6c0205
SHA512220bccebacfc2ed84623791843b2f15578797f8d596ac5a81244afdf08a0931552bd8060ec907f0acb671af61337b27cbc073f40c5e5b87e18c18ff795df8190