Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:03
Behavioral task
behavioral1
Sample
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe
Resource
win7-20220715-en
General
-
Target
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe
-
Size
571KB
-
MD5
c4e5cf65384d74ccae53b3703200a43f
-
SHA1
007cc54e2e4d6a424594750e0efca1d1a916b35c
-
SHA256
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
SHA512
7c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
Malware Config
Extracted
netwire
127.0.0.1:3360
192.3.24.231:3360
-
activex_autorun
true
-
activex_key
{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5}
-
copy_executable
true
-
delete_original
false
-
host_id
wolla
-
install_path
%AppData%\WndowsDefender\windowsdfender.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Zynova@56070
-
registry_autorun
true
-
startup_name
windefender
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1832-57-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/1832-65-0x0000000000082BCB-mapping.dmp netwire behavioral1/memory/1832-70-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/1192-87-0x0000000000082BCB-mapping.dmp netwire behavioral1/memory/1192-92-0x0000000000080000-0x00000000000AC000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
windowsdfender.exewindowsdfender.exepid process 1968 windowsdfender.exe 1192 windowsdfender.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5} windowsdfender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\WndowsDefender\\windowsdfender.exe\"" windowsdfender.exe -
Processes:
resource yara_rule behavioral1/memory/1932-67-0x0000000001360000-0x00000000014A9000-memory.dmp upx behavioral1/memory/1832-68-0x0000000001360000-0x00000000014A9000-memory.dmp upx \Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx behavioral1/memory/1968-76-0x00000000010A0000-0x00000000011E9000-memory.dmp upx behavioral1/memory/1968-90-0x00000000010A0000-0x00000000011E9000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx behavioral1/memory/1192-93-0x00000000010A0000-0x00000000011E9000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exepid process 1832 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ windowsdfender.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\windefender = "C:\\Users\\Admin\\AppData\\Roaming\\WndowsDefender\\windowsdfender.exe" windowsdfender.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1932-67-0x0000000001360000-0x00000000014A9000-memory.dmp autoit_exe behavioral1/memory/1968-76-0x00000000010A0000-0x00000000011E9000-memory.dmp autoit_exe behavioral1/memory/1968-90-0x00000000010A0000-0x00000000011E9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exedescription pid process target process PID 1932 set thread context of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1968 set thread context of 1192 1968 windowsdfender.exe windowsdfender.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exepid process 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1968 windowsdfender.exe 1968 windowsdfender.exe 1968 windowsdfender.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exepid process 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 1968 windowsdfender.exe 1968 windowsdfender.exe 1968 windowsdfender.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exedescription pid process target process PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1932 wrote to memory of 1832 1932 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 1832 wrote to memory of 1968 1832 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 1832 wrote to memory of 1968 1832 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 1832 wrote to memory of 1968 1832 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 1832 wrote to memory of 1968 1832 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe PID 1968 wrote to memory of 1192 1968 windowsdfender.exe windowsdfender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc