Analysis

  • max time kernel
    109s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2022 06:10

General

  • Target

    SV887INV0383288238.exe

  • Size

    1.1MB

  • MD5

    8c3b73e76bc182364b996f44e89be0bc

  • SHA1

    23bdc902db215b891e15c3e70f6e16477e80e73a

  • SHA256

    a7669d4b5d440dbcfe5e0470d4a5b8c82f804ecdf4d5dd0b3db8ed2323efd3e8

  • SHA512

    50f6b9b82ada49f2122c2e7e08250404850d79125b8b8a649dfb2c43084b8077422973c2ed70ad6bbe80758eac21c3394f56689a7e48cab074e71bf48ce99ca3

Malware Config

Extracted

Family

netwire

C2

149.102.132.253:3399

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 8 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SV887INV0383288238.exe
    "C:\Users\Admin\AppData\Local\Temp\SV887INV0383288238.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JLbJCjJym.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLbJCjJym" /XML "C:\Users\Admin\AppData\Local\Temp\tmp709F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:564

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp709F.tmp

      Filesize

      1KB

      MD5

      8241cda438b8de31dad138540c4aca66

      SHA1

      8957ab6665adc496c3112b9e2930deef420328bd

      SHA256

      103ae3ef6b231786cd43f6c91943f6a9afda86189b4614dce442ff6b4e7468a0

      SHA512

      a623f608e4dbd7d5c7726f84a9a247865d62f17f8926351ea29cd7dcaed6a7359aafe887b2819b636f255626f11b7edfd82617dc703b61c11fe178a9c771de64

    • memory/564-74-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-72-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-67-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-71-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-69-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-82-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-80-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-79-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-64-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-65-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/564-75-0x000000000041AE7B-mapping.dmp

    • memory/1268-78-0x000000006E3D0000-0x000000006E97B000-memory.dmp

      Filesize

      5.7MB

    • memory/1268-59-0x0000000000000000-mapping.dmp

    • memory/1268-81-0x000000006E3D0000-0x000000006E97B000-memory.dmp

      Filesize

      5.7MB

    • memory/1656-58-0x0000000004EB0000-0x0000000004F50000-memory.dmp

      Filesize

      640KB

    • memory/1656-54-0x0000000000D10000-0x0000000000E32000-memory.dmp

      Filesize

      1.1MB

    • memory/1656-57-0x0000000000570000-0x000000000057A000-memory.dmp

      Filesize

      40KB

    • memory/1656-56-0x0000000000280000-0x0000000000296000-memory.dmp

      Filesize

      88KB

    • memory/1656-63-0x0000000005040000-0x0000000005092000-memory.dmp

      Filesize

      328KB

    • memory/1656-55-0x0000000075591000-0x0000000075593000-memory.dmp

      Filesize

      8KB

    • memory/1760-60-0x0000000000000000-mapping.dmp