Analysis
-
max time kernel
175s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe
Resource
win7-20220718-en
windows7-x64
5 signatures
150 seconds
General
-
Target
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe
-
Size
588KB
-
MD5
8a66d7caef4291723ebd529425f7f3a7
-
SHA1
b1bc92bf6e09cb9355ee36000fae656417de6389
-
SHA256
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4
-
SHA512
82d83e26c3f69b1d7e45b36303a475f232c2e4958e8ccbe51371573f57a0521b2dbcfd28797ba92842fb5f354016fec7e2bd965206b81c20ad9c8d7e6390a338
Malware Config
Extracted
Family
netwire
C2
204.152.219.82:9008
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-64-0x0000000000400000-0x0000000000495000-memory.dmp netwire behavioral1/memory/1916-65-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exedescription pid process target process PID 1884 set thread context of 1916 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exepid process 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exedescription pid process target process PID 1884 wrote to memory of 1916 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe PID 1884 wrote to memory of 1916 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe PID 1884 wrote to memory of 1916 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe PID 1884 wrote to memory of 1916 1884 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe 5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe"C:\Users\Admin\AppData\Local\Temp\5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe"C:\Users\Admin\AppData\Local\Temp\5ea30913c8c57e66c619c00c244435a948b6e6980611a8579d121c5fec1ac4b4.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1884-56-0x00000000002D0000-0x00000000002D8000-memory.dmpFilesize
32KB
-
memory/1884-57-0x0000000076AE1000-0x0000000076AE3000-memory.dmpFilesize
8KB
-
memory/1884-58-0x0000000077A80000-0x0000000077C29000-memory.dmpFilesize
1.7MB
-
memory/1884-59-0x0000000077C60000-0x0000000077DE0000-memory.dmpFilesize
1.5MB
-
memory/1884-61-0x00000000002D0000-0x00000000002D8000-memory.dmpFilesize
32KB
-
memory/1884-62-0x0000000077C60000-0x0000000077DE0000-memory.dmpFilesize
1.5MB
-
memory/1916-60-0x000000000048898A-mapping.dmp
-
memory/1916-64-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/1916-65-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1916-67-0x0000000077A80000-0x0000000077C29000-memory.dmpFilesize
1.7MB
-
memory/1916-72-0x0000000000220000-0x0000000000228000-memory.dmpFilesize
32KB
-
memory/1916-73-0x0000000077C60000-0x0000000077DE0000-memory.dmpFilesize
1.5MB