Analysis

  • max time kernel
    125s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2022 06:33

General

  • Target

    753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2.exe

  • Size

    5.1MB

  • MD5

    9e4afe00eeccfecd3b0af3b53b3eff9d

  • SHA1

    a1189ac5ddc87a0e6b806ae757b419b0773b9f1f

  • SHA256

    753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2

  • SHA512

    bfbd4d4e5f01acc0a617c69f884e8d748453a45463fbcdf96634cdaff86b41e670c4d1558ce05a62c09e75b02b77632b9db3ba6fc2210100aa88f1e8818cd042

Malware Config

Signatures

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2.exe
    "C:\Users\Admin\AppData\Local\Temp\753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Roaming\Adobe\Human AI.exe
      "C:\Users\Admin\AppData\Local\Temp\753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2.exe"
      2⤵
      • Executes dropped EXE
      PID:3068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 456
        3⤵
        • Program crash
        PID:2828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 604
        3⤵
        • Program crash
        PID:3480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 636
        3⤵
        • Program crash
        PID:1584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 672
        3⤵
        • Program crash
        PID:1944
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3068 -ip 3068
    1⤵
      PID:3188
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3068 -ip 3068
      1⤵
        PID:1952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3068 -ip 3068
        1⤵
          PID:2176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3068 -ip 3068
          1⤵
            PID:1536

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Adobe\Human AI.exe

            Filesize

            5.1MB

            MD5

            9e4afe00eeccfecd3b0af3b53b3eff9d

            SHA1

            a1189ac5ddc87a0e6b806ae757b419b0773b9f1f

            SHA256

            753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2

            SHA512

            bfbd4d4e5f01acc0a617c69f884e8d748453a45463fbcdf96634cdaff86b41e670c4d1558ce05a62c09e75b02b77632b9db3ba6fc2210100aa88f1e8818cd042

          • C:\Users\Admin\AppData\Roaming\Adobe\Human AI.exe

            Filesize

            5.1MB

            MD5

            9e4afe00eeccfecd3b0af3b53b3eff9d

            SHA1

            a1189ac5ddc87a0e6b806ae757b419b0773b9f1f

            SHA256

            753842efd2e08e936743e8e0a2042834d53d44b7f35158be4565374c051542b2

            SHA512

            bfbd4d4e5f01acc0a617c69f884e8d748453a45463fbcdf96634cdaff86b41e670c4d1558ce05a62c09e75b02b77632b9db3ba6fc2210100aa88f1e8818cd042

          • memory/3068-132-0x0000000000000000-mapping.dmp

          • memory/3068-135-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3068-136-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3068-138-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3068-139-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3128-130-0x0000000002700000-0x000000000277B000-memory.dmp

            Filesize

            492KB

          • memory/3128-131-0x0000000002700000-0x000000000277B000-memory.dmp

            Filesize

            492KB

          • memory/3128-140-0x0000000002700000-0x000000000277B000-memory.dmp

            Filesize

            492KB