Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 06:36
Static task
static1
Behavioral task
behavioral1
Sample
Order NO0199344401.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Order NO0199344401.exe
-
Size
627KB
-
MD5
d117ae838dd79cd03233a72d679a8bac
-
SHA1
1e4bae77f84e868f6e306ae409e4a43cfd155a2b
-
SHA256
a22f0ccaf502f542dae2af218319b9f14bae57849237142ea0f16bef196f4027
-
SHA512
d22ba5fac4673feabb1ad9aee231f35b1ad4fc488221100cf4c2b6e1a96df57b49c2e2c60e9bfacae06c895d87ffc4e561cad85ee9fd557141582b1ee4cb4fda
Malware Config
Extracted
Family
netwire
C2
loffgghh.duckdns.org:3300
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2488-136-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2488-137-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2488-138-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2488-139-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order NO0199344401.exedescription pid process target process PID 2316 set thread context of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Order NO0199344401.exedescription pid process target process PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe PID 2316 wrote to memory of 2488 2316 Order NO0199344401.exe Order NO0199344401.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order NO0199344401.exe"C:\Users\Admin\AppData\Local\Temp\Order NO0199344401.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Order NO0199344401.exe"C:\Users\Admin\AppData\Local\Temp\Order NO0199344401.exe"2⤵PID:2488