Analysis

  • max time kernel
    87s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 05:00

General

  • Target

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f.exe

  • Size

    334KB

  • MD5

    d6e7b054d5d6fe1a95bc2ffe79cec555

  • SHA1

    becb9f6c35b5e3028cf601b1af77630cb8f94005

  • SHA256

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f

  • SHA512

    a63a7ab033fdf7faa196ab652c304ab3c2fa47215e800aa46282b2623ba87c4aac58f8478e06d14d77e693c37015c2b2a3a2502dec67d35f4bc6af668477a5af

Malware Config

Signatures

  • NetWire RAT payload 10 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f.exe
    "C:\Users\Admin\AppData\Local\Temp\345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f.exe
      "C:/Users/Admin/AppData/Local/Temp/345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe
          "C:/Users/Admin/AppData/Roaming/Microsoft/Internet Explorer/Quick Launch/ie.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    2.6MB

    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe

    Filesize

    334KB

    MD5

    d6e7b054d5d6fe1a95bc2ffe79cec555

    SHA1

    becb9f6c35b5e3028cf601b1af77630cb8f94005

    SHA256

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f

    SHA512

    a63a7ab033fdf7faa196ab652c304ab3c2fa47215e800aa46282b2623ba87c4aac58f8478e06d14d77e693c37015c2b2a3a2502dec67d35f4bc6af668477a5af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe

    Filesize

    334KB

    MD5

    d6e7b054d5d6fe1a95bc2ffe79cec555

    SHA1

    becb9f6c35b5e3028cf601b1af77630cb8f94005

    SHA256

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f

    SHA512

    a63a7ab033fdf7faa196ab652c304ab3c2fa47215e800aa46282b2623ba87c4aac58f8478e06d14d77e693c37015c2b2a3a2502dec67d35f4bc6af668477a5af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe

    Filesize

    334KB

    MD5

    d6e7b054d5d6fe1a95bc2ffe79cec555

    SHA1

    becb9f6c35b5e3028cf601b1af77630cb8f94005

    SHA256

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f

    SHA512

    a63a7ab033fdf7faa196ab652c304ab3c2fa47215e800aa46282b2623ba87c4aac58f8478e06d14d77e693c37015c2b2a3a2502dec67d35f4bc6af668477a5af

  • \Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ie.exe

    Filesize

    334KB

    MD5

    d6e7b054d5d6fe1a95bc2ffe79cec555

    SHA1

    becb9f6c35b5e3028cf601b1af77630cb8f94005

    SHA256

    345049ac125439890dfd44dc7451de56bcbdebb18230f0facf1858574ffa6c9f

    SHA512

    a63a7ab033fdf7faa196ab652c304ab3c2fa47215e800aa46282b2623ba87c4aac58f8478e06d14d77e693c37015c2b2a3a2502dec67d35f4bc6af668477a5af

  • memory/896-91-0x00000000004026D0-mapping.dmp

  • memory/896-96-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/896-95-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-58-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-63-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-68-0x00000000004026D0-mapping.dmp

  • memory/912-71-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-67-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-60-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-75-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-57-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-97-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-65-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/912-62-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1372-73-0x0000000000000000-mapping.dmp

  • memory/1372-77-0x0000000000B20000-0x0000000000B76000-memory.dmp

    Filesize

    344KB

  • memory/1988-54-0x0000000000F60000-0x0000000000FB6000-memory.dmp

    Filesize

    344KB

  • memory/1988-55-0x0000000000360000-0x0000000000388000-memory.dmp

    Filesize

    160KB

  • memory/1988-56-0x0000000075731000-0x0000000075733000-memory.dmp

    Filesize

    8KB