Analysis

  • max time kernel
    111s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2022 11:58

General

  • Target

    Payment confirmation.exe

  • Size

    829KB

  • MD5

    ba419928d6a9ef178f04260d57f1df7e

  • SHA1

    754c7e767823aa6b39db9266c3fbd6f466b942a8

  • SHA256

    8d30b1713bdbee571ed08365e29d34de1fd0d152a9d816a1e315d92b384f94e9

  • SHA512

    1a33cb673c9117b24e3699117d5de8a49e9e0c5c08a9b115edd4524e58e6a9b8c9f61672035147b7b3c726711c67f0ff902ce28a3fe2511db0d1aa3e4ad42f34

Malware Config

Extracted

Family

netwire

C2

185.140.53.61:3363

185.140.53.61:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    move4ward

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe
    "C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QuJxuK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4B3.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1208
    • C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe
      "{path}"
      2⤵
        PID:2104

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp4B3.tmp

      Filesize

      1KB

      MD5

      d1d8fce0708ce719ab031ff9914837f3

      SHA1

      8a74428688672cbab82ebb39b16cf268d414f7a9

      SHA256

      aa07e2d275c0b2b3401b4376e9713fae3882ebc90f383805ec100a964b54b689

      SHA512

      e1c5115430f1e1cb6e45e3cbb59b15b9d4a9f3395421556715a73185f080e79d9b9fdb8163d2590fba2e719c6a81c5fbf2af61de6b62044f9998aadf14fe7ddd

    • memory/1208-135-0x0000000000000000-mapping.dmp

    • memory/1624-130-0x0000000000BD0000-0x0000000000CA4000-memory.dmp

      Filesize

      848KB

    • memory/1624-131-0x0000000008040000-0x00000000085E4000-memory.dmp

      Filesize

      5.6MB

    • memory/1624-132-0x0000000007B30000-0x0000000007BC2000-memory.dmp

      Filesize

      584KB

    • memory/1624-133-0x0000000007BD0000-0x0000000007C6C000-memory.dmp

      Filesize

      624KB

    • memory/1624-134-0x0000000007B10000-0x0000000007B1A000-memory.dmp

      Filesize

      40KB

    • memory/2104-137-0x0000000000000000-mapping.dmp

    • memory/2104-138-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2104-140-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2104-141-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2104-142-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB