Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
05-08-2022 22:59
Static task
static1
Behavioral task
behavioral1
Sample
BinaryWr.exe
Resource
win7-20220715-en
General
-
Target
BinaryWr.exe
-
Size
1.2MB
-
MD5
e366f96c9b5c5528426a116eb49ef445
-
SHA1
8062220b613b56116d638b3d7f5dd043f3bc096e
-
SHA256
2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
-
SHA512
1dc21da10c45a5fbd5058e85d775cccec140a0fec067183013457d7ab87f9bfd758429a999df2b2bf0afd19d44b289418c6a8457689346521764a812a0430e9d
Malware Config
Extracted
netwire
xman2.duckdns.org:4433
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1112-69-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1112-71-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1112-72-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1112-74-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1112-75-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/1112-78-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1112-80-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BinaryWr.exedescription pid process target process PID 912 set thread context of 1112 912 BinaryWr.exe BinaryWr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
BinaryWr.exepowershell.exepid process 912 BinaryWr.exe 912 BinaryWr.exe 912 BinaryWr.exe 912 BinaryWr.exe 912 BinaryWr.exe 912 BinaryWr.exe 2028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BinaryWr.exepowershell.exedescription pid process Token: SeDebugPrivilege 912 BinaryWr.exe Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
BinaryWr.exedescription pid process target process PID 912 wrote to memory of 2028 912 BinaryWr.exe powershell.exe PID 912 wrote to memory of 2028 912 BinaryWr.exe powershell.exe PID 912 wrote to memory of 2028 912 BinaryWr.exe powershell.exe PID 912 wrote to memory of 2028 912 BinaryWr.exe powershell.exe PID 912 wrote to memory of 1972 912 BinaryWr.exe schtasks.exe PID 912 wrote to memory of 1972 912 BinaryWr.exe schtasks.exe PID 912 wrote to memory of 1972 912 BinaryWr.exe schtasks.exe PID 912 wrote to memory of 1972 912 BinaryWr.exe schtasks.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe PID 912 wrote to memory of 1112 912 BinaryWr.exe BinaryWr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BinaryWr.exe"C:\Users\Admin\AppData\Local\Temp\BinaryWr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rWWREmAZOgElhb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE283.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\BinaryWr.exe"C:\Users\Admin\AppData\Local\Temp\BinaryWr.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpE283.tmpFilesize
1KB
MD5f113075150d6fc4a84e6373c03ae954b
SHA1b010ffd275953f366e67fe2db5e7189f85c852e9
SHA2563ab61549518cee4c99de89b22b99c398ad3889f82330e57319c755b5b21977fd
SHA512de40b64833cfd6c30ea37d2df34df88e6d2c286f1075407a0dedecb2d93b82ba1d20bfe6c92bfc1d2c58e10beeda152d8fcc25371cd80406384f0c67c25e3725
-
memory/912-55-0x0000000074DB1000-0x0000000074DB3000-memory.dmpFilesize
8KB
-
memory/912-56-0x00000000002C0000-0x00000000002D6000-memory.dmpFilesize
88KB
-
memory/912-57-0x00000000002F0000-0x00000000002FA000-memory.dmpFilesize
40KB
-
memory/912-58-0x000000000A430000-0x000000000A4C8000-memory.dmpFilesize
608KB
-
memory/912-54-0x0000000000A70000-0x0000000000BB4000-memory.dmpFilesize
1.3MB
-
memory/912-63-0x0000000005000000-0x000000000504C000-memory.dmpFilesize
304KB
-
memory/1112-74-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-72-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-64-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-65-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-67-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-69-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-71-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-80-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-78-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1112-75-0x000000000041AE7B-mapping.dmp
-
memory/1972-60-0x0000000000000000-mapping.dmp
-
memory/2028-59-0x0000000000000000-mapping.dmp
-
memory/2028-79-0x000000006BED0000-0x000000006C47B000-memory.dmpFilesize
5.7MB
-
memory/2028-81-0x000000006BED0000-0x000000006C47B000-memory.dmpFilesize
5.7MB