Analysis
-
max time kernel
96s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.9061.exe
Resource
win7-20220901-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.9061.exe
-
Size
666KB
-
MD5
bbd4d6df4dd680a7253bf7343292225e
-
SHA1
1b0dc36d3de872c4096b5a3bd93ef063fcf50ecb
-
SHA256
fdf3f859ee5b8be0d6cda53c88e94d6b75b676e055102b828fc8106826f446ce
-
SHA512
62881bb38c200dac57dfdbace7f7a3538ddf52f9c231d8afb3c92a4e7bfb69438a71174b1806687f01ed9a8136ae8e72e72e55b353ea36f4e1da40e9dc61a974
-
SSDEEP
12288:ibPil1JMpnl5GNFBxFLHHR0YrJWlylSx16FBzrAjmlyN+dq5ejjhLWfY:ib6lH6vOFBxFTdE
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1568-66-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-67-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-68-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-70-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-71-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-72-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1568-75-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1568-79-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1780-96-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1780-100-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1780-101-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1692 Host.exe 1780 Host.exe -
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.9061.exepid process 1568 SecuriteInfo.com.Win32.PWSX-gen.9061.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.9061.exeHost.exedescription pid process target process PID 1280 set thread context of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1692 set thread context of 1780 1692 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.9061.exeHost.exepid process 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe 1692 Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.9061.exeHost.exedescription pid process Token: SeDebugPrivilege 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe Token: SeDebugPrivilege 1692 Host.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.9061.exeSecuriteInfo.com.Win32.PWSX-gen.9061.exeHost.exedescription pid process target process PID 1280 wrote to memory of 536 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe schtasks.exe PID 1280 wrote to memory of 536 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe schtasks.exe PID 1280 wrote to memory of 536 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe schtasks.exe PID 1280 wrote to memory of 536 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe schtasks.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1280 wrote to memory of 1568 1280 SecuriteInfo.com.Win32.PWSX-gen.9061.exe SecuriteInfo.com.Win32.PWSX-gen.9061.exe PID 1568 wrote to memory of 1692 1568 SecuriteInfo.com.Win32.PWSX-gen.9061.exe Host.exe PID 1568 wrote to memory of 1692 1568 SecuriteInfo.com.Win32.PWSX-gen.9061.exe Host.exe PID 1568 wrote to memory of 1692 1568 SecuriteInfo.com.Win32.PWSX-gen.9061.exe Host.exe PID 1568 wrote to memory of 1692 1568 SecuriteInfo.com.Win32.PWSX-gen.9061.exe Host.exe PID 1692 wrote to memory of 1544 1692 Host.exe schtasks.exe PID 1692 wrote to memory of 1544 1692 Host.exe schtasks.exe PID 1692 wrote to memory of 1544 1692 Host.exe schtasks.exe PID 1692 wrote to memory of 1544 1692 Host.exe schtasks.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe PID 1692 wrote to memory of 1780 1692 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9061.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9061.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UNyTzXTTIG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4EE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9061.exe"{path}"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UNyTzXTTIG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp71E6.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp71E6.tmpFilesize
1KB
MD5997d38d59294a7b94a2c87c663c1ecf0
SHA1ca76ac4bb83ae5484ea358fdc731cd72a5303f8f
SHA2567d3d27b45522f6eb970a813d991791ba2a9f5d19ea6eb346ff4e27bf67ca6994
SHA5127a03bf26a6c310b9672b367f5c1c01a669527b4f5cf86c664bfa5e414eebc94b1a95c2cc4e57ad2973f53fcbd3bfe205b480739ac849173110fcf0b345595bbb
-
C:\Users\Admin\AppData\Local\Temp\tmpB4EE.tmpFilesize
1KB
MD5997d38d59294a7b94a2c87c663c1ecf0
SHA1ca76ac4bb83ae5484ea358fdc731cd72a5303f8f
SHA2567d3d27b45522f6eb970a813d991791ba2a9f5d19ea6eb346ff4e27bf67ca6994
SHA5127a03bf26a6c310b9672b367f5c1c01a669527b4f5cf86c664bfa5e414eebc94b1a95c2cc4e57ad2973f53fcbd3bfe205b480739ac849173110fcf0b345595bbb
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
666KB
MD5bbd4d6df4dd680a7253bf7343292225e
SHA11b0dc36d3de872c4096b5a3bd93ef063fcf50ecb
SHA256fdf3f859ee5b8be0d6cda53c88e94d6b75b676e055102b828fc8106826f446ce
SHA51262881bb38c200dac57dfdbace7f7a3538ddf52f9c231d8afb3c92a4e7bfb69438a71174b1806687f01ed9a8136ae8e72e72e55b353ea36f4e1da40e9dc61a974
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
666KB
MD5bbd4d6df4dd680a7253bf7343292225e
SHA11b0dc36d3de872c4096b5a3bd93ef063fcf50ecb
SHA256fdf3f859ee5b8be0d6cda53c88e94d6b75b676e055102b828fc8106826f446ce
SHA51262881bb38c200dac57dfdbace7f7a3538ddf52f9c231d8afb3c92a4e7bfb69438a71174b1806687f01ed9a8136ae8e72e72e55b353ea36f4e1da40e9dc61a974
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
666KB
MD5bbd4d6df4dd680a7253bf7343292225e
SHA11b0dc36d3de872c4096b5a3bd93ef063fcf50ecb
SHA256fdf3f859ee5b8be0d6cda53c88e94d6b75b676e055102b828fc8106826f446ce
SHA51262881bb38c200dac57dfdbace7f7a3538ddf52f9c231d8afb3c92a4e7bfb69438a71174b1806687f01ed9a8136ae8e72e72e55b353ea36f4e1da40e9dc61a974
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
666KB
MD5bbd4d6df4dd680a7253bf7343292225e
SHA11b0dc36d3de872c4096b5a3bd93ef063fcf50ecb
SHA256fdf3f859ee5b8be0d6cda53c88e94d6b75b676e055102b828fc8106826f446ce
SHA51262881bb38c200dac57dfdbace7f7a3538ddf52f9c231d8afb3c92a4e7bfb69438a71174b1806687f01ed9a8136ae8e72e72e55b353ea36f4e1da40e9dc61a974
-
memory/536-59-0x0000000000000000-mapping.dmp
-
memory/1280-57-0x0000000004CB0000-0x0000000004D2C000-memory.dmpFilesize
496KB
-
memory/1280-58-0x00000000009B0000-0x00000000009DE000-memory.dmpFilesize
184KB
-
memory/1280-54-0x0000000001110000-0x00000000011BC000-memory.dmpFilesize
688KB
-
memory/1280-56-0x00000000003C0000-0x00000000003E0000-memory.dmpFilesize
128KB
-
memory/1280-55-0x0000000075601000-0x0000000075603000-memory.dmpFilesize
8KB
-
memory/1544-83-0x0000000000000000-mapping.dmp
-
memory/1568-71-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-79-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-72-0x000000000040242D-mapping.dmp
-
memory/1568-75-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-68-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-61-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-67-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-70-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-62-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-66-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1568-64-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1692-81-0x00000000011F0000-0x000000000129C000-memory.dmpFilesize
688KB
-
memory/1692-77-0x0000000000000000-mapping.dmp
-
memory/1780-96-0x000000000040242D-mapping.dmp
-
memory/1780-100-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1780-101-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB