Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2022 06:37
Static task
static1
General
-
Target
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe
-
Size
1.0MB
-
MD5
86afe7748042ad36d8ad98bc9cd231d7
-
SHA1
595630681e9a397085925fe2219a79c06baa7de9
-
SHA256
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0
-
SHA512
04884dc39568b100899238937249f9ad0c897f573cda1ff849df6b701699c9d526ab8e208ec42a9ad1c275fe83fe809dbb7e3f007842fb59cbe13a0a7ed0ab6f
Malware Config
Extracted
Family
netwire
C2
80.66.64.136:6671
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
kongking
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-140-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1724-141-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1724-142-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1724-143-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1724-144-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exedescription pid process target process PID 3196 set thread context of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exepid process 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exedescription pid process Token: SeDebugPrivilege 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exedescription pid process target process PID 3196 wrote to memory of 636 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 636 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 636 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe PID 3196 wrote to memory of 1724 3196 db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"2⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"C:\Users\Admin\AppData\Local\Temp\db1f67662e5ca9e31d8b97e81868b9aac471202866dc442e3617613ab53fa2f0.exe"2⤵PID:1724