Analysis
-
max time kernel
98s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 05:03
Behavioral task
behavioral1
Sample
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe
Resource
win7-20220715-en
General
-
Target
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe
-
Size
571KB
-
MD5
c4e5cf65384d74ccae53b3703200a43f
-
SHA1
007cc54e2e4d6a424594750e0efca1d1a916b35c
-
SHA256
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
-
SHA512
7c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
Malware Config
Extracted
netwire
127.0.0.1:3360
192.3.24.231:3360
-
activex_autorun
true
-
activex_key
{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5}
-
copy_executable
true
-
delete_original
false
-
host_id
wolla
-
install_path
%AppData%\WndowsDefender\windowsdfender.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Zynova@56070
-
registry_autorun
true
-
startup_name
windefender
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/888-135-0x00000000001B0000-0x00000000001DC000-memory.dmp netwire behavioral2/memory/888-144-0x00000000001B0000-0x00000000001DC000-memory.dmp netwire behavioral2/memory/5084-151-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/5084-161-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
windowsdfender.exewindowsdfender.exepid process 3764 windowsdfender.exe 5084 windowsdfender.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\WndowsDefender\\windowsdfender.exe\"" windowsdfender.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3S3J5K72-NCT4-881G-T2U7-3QAIRGR5S7U5} windowsdfender.exe -
Processes:
resource yara_rule behavioral2/memory/4920-132-0x0000000000820000-0x0000000000969000-memory.dmp upx behavioral2/memory/4920-133-0x0000000000820000-0x0000000000969000-memory.dmp upx behavioral2/memory/4920-145-0x0000000000820000-0x0000000000969000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx behavioral2/memory/3764-149-0x0000000000560000-0x00000000006A9000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe upx behavioral2/memory/5084-162-0x0000000000560000-0x00000000006A9000-memory.dmp upx behavioral2/memory/3764-163-0x0000000000560000-0x00000000006A9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
windowsdfender.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ windowsdfender.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windefender = "C:\\Users\\Admin\\AppData\\Roaming\\WndowsDefender\\windowsdfender.exe" windowsdfender.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4920-133-0x0000000000820000-0x0000000000969000-memory.dmp autoit_exe behavioral2/memory/4920-145-0x0000000000820000-0x0000000000969000-memory.dmp autoit_exe behavioral2/memory/3764-149-0x0000000000560000-0x00000000006A9000-memory.dmp autoit_exe behavioral2/memory/3764-163-0x0000000000560000-0x00000000006A9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exedescription pid process target process PID 4920 set thread context of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 3764 set thread context of 5084 3764 windowsdfender.exe windowsdfender.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exepid process 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 3764 windowsdfender.exe 3764 windowsdfender.exe 3764 windowsdfender.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exepid process 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 3764 windowsdfender.exe 3764 windowsdfender.exe 3764 windowsdfender.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exewindowsdfender.exedescription pid process target process PID 4920 wrote to memory of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 4920 wrote to memory of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 4920 wrote to memory of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 4920 wrote to memory of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 4920 wrote to memory of 888 4920 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe PID 888 wrote to memory of 3764 888 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 888 wrote to memory of 3764 888 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 888 wrote to memory of 3764 888 81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe windowsdfender.exe PID 3764 wrote to memory of 5084 3764 windowsdfender.exe windowsdfender.exe PID 3764 wrote to memory of 5084 3764 windowsdfender.exe windowsdfender.exe PID 3764 wrote to memory of 5084 3764 windowsdfender.exe windowsdfender.exe PID 3764 wrote to memory of 5084 3764 windowsdfender.exe windowsdfender.exe PID 3764 wrote to memory of 5084 3764 windowsdfender.exe windowsdfender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"C:\Users\Admin\AppData\Local\Temp\81dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"C:\Users\Admin\AppData\Roaming\WndowsDefender\windowsdfender.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:5084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc
-
Filesize
571KB
MD5c4e5cf65384d74ccae53b3703200a43f
SHA1007cc54e2e4d6a424594750e0efca1d1a916b35c
SHA25681dbe903ee1e3ebe0d3e5edc9f4072996b44e2c6557f1af309d25a147029d7dd
SHA5127c22fdf9fa9ee2a252e347a56256d2f7f5aea96bc37cb954142a9cbb6a4fbc6ac6b5ff9f2d5b01342627efbde9bf64d628f148b94e33d8b37c5809bbe8b7a7dc