Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
Resource
win10v2004-20220812-en
General
-
Target
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
-
Size
219KB
-
MD5
69fe47844312a1dd8a8a4b64eace8bb0
-
SHA1
1080345aa844d9e0202aeb15f8299a961b35adad
-
SHA256
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
-
SHA512
d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
SSDEEP
6144:PkHrBxmJv65Us2rv7QtHQy71FxVVh/UF/gk5c:sdMJeUs2z7uHQSzzn/UNgk5c
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1312-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1312-67-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1312-69-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1312-73-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1312-77-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/108-93-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/108-99-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
HKRUN.exeHKRUN.exepid process 936 HKRUN.exe 108 HKRUN.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SL5JY177-PJ3Y-E8CD-646H-S0V6OY4OJKL6} HKRUN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SL5JY177-PJ3Y-E8CD-646H-S0V6OY4OJKL6}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe\"" HKRUN.exe -
Loads dropped DLL 2 IoCs
Processes:
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exepid process 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ HKRUN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\RegEdit1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe" HKRUN.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exeHKRUN.exedescription pid process target process PID 1536 set thread context of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 936 set thread context of 108 936 HKRUN.exe HKRUN.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exea142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exeHKRUN.exedescription pid process target process PID 1536 wrote to memory of 1368 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1368 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1368 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1368 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1536 wrote to memory of 1312 1536 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1312 wrote to memory of 936 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 1312 wrote to memory of 936 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 1312 wrote to memory of 936 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 1312 wrote to memory of 936 1312 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe PID 936 wrote to memory of 108 936 HKRUN.exe HKRUN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"2⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d