Analysis

  • max time kernel
    104s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 06:33

General

  • Target

    fe231e75021cd99c711cff304716f70df03ee0076084f7be2a8f37e5ead5b482.exe

  • Size

    188KB

  • MD5

    0cf4eaf6f59888c47b70b355980cf44f

  • SHA1

    76749c2c56057f976962bad79a41de19ef4f21d4

  • SHA256

    fe231e75021cd99c711cff304716f70df03ee0076084f7be2a8f37e5ead5b482

  • SHA512

    aadce511fe2fc222271755e77e3560e865af8b34e76c84d3d9c22c1a060951f2ea342ffdc5e441a231d30ce0b7cf3a9e4985f02e3f9c235353826435667fae4f

Malware Config

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe231e75021cd99c711cff304716f70df03ee0076084f7be2a8f37e5ead5b482.exe
    "C:\Users\Admin\AppData\Local\Temp\fe231e75021cd99c711cff304716f70df03ee0076084f7be2a8f37e5ead5b482.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\fe231e75021cd99c711cff304716f70df03ee0076084f7be2a8f37e5ead5b482.exe"
      2⤵
        PID:240

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/240-56-0x00000000004026D0-mapping.dmp
    • memory/240-58-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/240-59-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/1328-54-0x0000000000130000-0x0000000000135000-memory.dmp
      Filesize

      20KB

    • memory/1328-55-0x0000000076A21000-0x0000000076A23000-memory.dmp
      Filesize

      8KB