Analysis
-
max time kernel
77s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 03:49
Behavioral task
behavioral1
Sample
97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe
Resource
win7-20220718-en
General
-
Target
97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe
-
Size
107KB
-
MD5
bf33aed1340146e9499c756caf71def6
-
SHA1
351384c18969a0b2d5271d4769af549e4e56d26f
-
SHA256
97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e
-
SHA512
25598109743182f7e6100d67cac12663794150878c3ff3feed4e88a0c3acd72bebf71f6caf7efd5d0405f4676952bddcf7aa6ee640b13a04c6cd4c3f783a5be4
Malware Config
Extracted
netwire
45.138.157.98:3586
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
PsYeHHVA
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire \Users\Admin\AppData\Roaming\Install\Host.exe netwire \Users\Admin\AppData\Roaming\Install\Host.exe netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1952 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exepid process 1960 97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe 1960 97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exedescription pid process target process PID 1960 wrote to memory of 1952 1960 97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe Host.exe PID 1960 wrote to memory of 1952 1960 97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe Host.exe PID 1960 wrote to memory of 1952 1960 97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe"C:\Users\Admin\AppData\Local\Temp\97566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5bf33aed1340146e9499c756caf71def6
SHA1351384c18969a0b2d5271d4769af549e4e56d26f
SHA25697566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e
SHA51225598109743182f7e6100d67cac12663794150878c3ff3feed4e88a0c3acd72bebf71f6caf7efd5d0405f4676952bddcf7aa6ee640b13a04c6cd4c3f783a5be4
-
Filesize
107KB
MD5bf33aed1340146e9499c756caf71def6
SHA1351384c18969a0b2d5271d4769af549e4e56d26f
SHA25697566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e
SHA51225598109743182f7e6100d67cac12663794150878c3ff3feed4e88a0c3acd72bebf71f6caf7efd5d0405f4676952bddcf7aa6ee640b13a04c6cd4c3f783a5be4
-
Filesize
107KB
MD5bf33aed1340146e9499c756caf71def6
SHA1351384c18969a0b2d5271d4769af549e4e56d26f
SHA25697566bb258ee32164c2fb8370e2877ef88c9f0e4ea9e9456153d76f020a8ab0e
SHA51225598109743182f7e6100d67cac12663794150878c3ff3feed4e88a0c3acd72bebf71f6caf7efd5d0405f4676952bddcf7aa6ee640b13a04c6cd4c3f783a5be4