Analysis
-
max time kernel
103s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe
Resource
win10v2004-20220721-en
General
-
Target
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe
-
Size
604KB
-
MD5
06c5d04214063a365e85aba8a7d1a5ca
-
SHA1
cbdf52430e8c7479e12071ee1349008353eee433
-
SHA256
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
-
SHA512
68b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097
Malware Config
Extracted
netwire
79.134.225.120:8765
-
activex_autorun
true
-
activex_key
{7XOS4W0K-H4LE-56X7-UJ07-L110BJ4GFYE8}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
win01
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-66-0x0000000000400000-0x0000000000498000-memory.dmp netwire behavioral1/memory/2028-67-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/896-92-0x0000000000400000-0x0000000000498000-memory.dmp netwire behavioral1/memory/896-93-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1844 Host.exe 896 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7XOS4W0K-H4LE-56X7-UJ07-L110BJ4GFYE8} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7XOS4W0K-H4LE-56X7-UJ07-L110BJ4GFYE8}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 2 IoCs
Processes:
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exepid process 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\win01 = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeHost.exeHost.exepid process 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe 1844 Host.exe 896 Host.exe 896 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeHost.exedescription pid process target process PID 1660 set thread context of 2028 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe PID 1844 set thread context of 896 1844 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeHost.exepid process 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe 1844 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exeHost.exedescription pid process target process PID 1660 wrote to memory of 2028 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe PID 1660 wrote to memory of 2028 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe PID 1660 wrote to memory of 2028 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe PID 1660 wrote to memory of 2028 1660 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe PID 2028 wrote to memory of 1844 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe Host.exe PID 2028 wrote to memory of 1844 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe Host.exe PID 2028 wrote to memory of 1844 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe Host.exe PID 2028 wrote to memory of 1844 2028 ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe Host.exe PID 1844 wrote to memory of 896 1844 Host.exe Host.exe PID 1844 wrote to memory of 896 1844 Host.exe Host.exe PID 1844 wrote to memory of 896 1844 Host.exe Host.exe PID 1844 wrote to memory of 896 1844 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe"C:\Users\Admin\AppData\Local\Temp\ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe"C:\Users\Admin\AppData\Local\Temp\ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604KB
MD506c5d04214063a365e85aba8a7d1a5ca
SHA1cbdf52430e8c7479e12071ee1349008353eee433
SHA256ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
SHA51268b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097
-
Filesize
604KB
MD506c5d04214063a365e85aba8a7d1a5ca
SHA1cbdf52430e8c7479e12071ee1349008353eee433
SHA256ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
SHA51268b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097
-
Filesize
604KB
MD506c5d04214063a365e85aba8a7d1a5ca
SHA1cbdf52430e8c7479e12071ee1349008353eee433
SHA256ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
SHA51268b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097
-
Filesize
604KB
MD506c5d04214063a365e85aba8a7d1a5ca
SHA1cbdf52430e8c7479e12071ee1349008353eee433
SHA256ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
SHA51268b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097
-
Filesize
604KB
MD506c5d04214063a365e85aba8a7d1a5ca
SHA1cbdf52430e8c7479e12071ee1349008353eee433
SHA256ae1f2914d61d01d927899c62c72a62590ce08baa18a78a1e56bd9dfdda634f3f
SHA51268b49fd290a4ce1215a44045528c13fca56bf82dc99d674b25ab7218b07ece7f921c31bd9b4040aab194c24d24ae3db072b2de6e3d03e6cc6f5ea146fe948097