Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe
Resource
win7-20220715-en
General
-
Target
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe
-
Size
1.3MB
-
MD5
9f87dadf4d0571f3e441c9d5911864c8
-
SHA1
832dfa671b4be3085e997ffd46e0bc243f1f74b8
-
SHA256
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
-
SHA512
02750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580
Malware Config
Extracted
netwire
185.244.30.254:3361
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2392-135-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 4592 Host.exe -
Drops startup file 1 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sppsvc.url 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exedescription pid process target process PID 4016 set thread context of 2392 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exepid process 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exeHost.exepid process 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4592 Host.exe 4592 Host.exe 4592 Host.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exeHost.exepid process 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 4592 Host.exe 4592 Host.exe 4592 Host.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exedescription pid process target process PID 4016 wrote to memory of 2392 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe PID 4016 wrote to memory of 2392 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe PID 4016 wrote to memory of 2392 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe PID 4016 wrote to memory of 2392 4016 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe PID 2392 wrote to memory of 4592 2392 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe Host.exe PID 2392 wrote to memory of 4592 2392 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe Host.exe PID 2392 wrote to memory of 4592 2392 876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe"C:\Users\Admin\AppData\Local\Temp\876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe"C:\Users\Admin\AppData\Local\Temp\876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59f87dadf4d0571f3e441c9d5911864c8
SHA1832dfa671b4be3085e997ffd46e0bc243f1f74b8
SHA256876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
SHA51202750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580
-
Filesize
1.3MB
MD59f87dadf4d0571f3e441c9d5911864c8
SHA1832dfa671b4be3085e997ffd46e0bc243f1f74b8
SHA256876da78bf436f68353ab2cf07e68a195843e19c147fdef83add2efc1352e66f6
SHA51202750caf93c3017ab0b00993b680265cf6166b377379a8ba8f63ee1acb02d528a87b1b54502dfb97fdd31a3d13feda0621d827e238490b2a6c537252ef8b7580