Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 09:53
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe
Resource
win7-20220718-en
windows7-x64
5 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe
-
Size
412KB
-
MD5
afa993ae036de690642a6275a3053ede
-
SHA1
b2bdb616a2f6b8eb2c59340ede249e1b109ba5e7
-
SHA256
214751a0d73e0aa9a6f5c010fd3c4fd45d5a2e4f96db8c2875355c399ff3a5bc
-
SHA512
a1f7737a09762d69383db25e32284b1682d71c974767329537e10873703bc0ec2ac4ef310dd53633efc74f498dc2ceef78de9196f12a9039a3a5daf36633a36b
Malware Config
Extracted
Family
netwire
C2
194.5.98.178:3384
194.5.98.178:3385
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
lovewin1
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5080-135-0x00000000005A0000-0x00000000005D3000-memory.dmp netwire behavioral2/memory/5080-139-0x00000000005A0000-0x00000000005D3000-memory.dmp netwire behavioral2/memory/5080-144-0x00000000005A0000-0x00000000005D3000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exedescription pid process target process PID 3168 set thread context of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4180 5080 WerFault.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exedescription pid process Token: SeDebugPrivilege 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exedescription pid process target process PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe PID 3168 wrote to memory of 5080 3168 SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Mardom.MN.10.9492.exe"2⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 3163⤵
- Program crash
PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5080 -ip 50801⤵PID:5104