Analysis
-
max time kernel
165s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
Resource
win10v2004-20220812-en
General
-
Target
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe
-
Size
219KB
-
MD5
69fe47844312a1dd8a8a4b64eace8bb0
-
SHA1
1080345aa844d9e0202aeb15f8299a961b35adad
-
SHA256
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
-
SHA512
d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
SSDEEP
6144:PkHrBxmJv65Us2rv7QtHQy71FxVVh/UF/gk5c:sdMJeUs2z7uHQSzzn/UNgk5c
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2088-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2088-137-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2088-140-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2088-144-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2224-157-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
HKRUN.exeHKRUN.exepid process 1832 HKRUN.exe 2224 HKRUN.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{SL5JY177-PJ3Y-E8CD-646H-S0V6OY4OJKL6}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe\"" HKRUN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{SL5JY177-PJ3Y-E8CD-646H-S0V6OY4OJKL6} HKRUN.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
HKRUN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegEdit1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\HKRUN.exe" HKRUN.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ HKRUN.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exeHKRUN.exedescription pid process target process PID 392 set thread context of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 1832 set thread context of 2224 1832 HKRUN.exe HKRUN.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exea142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exeHKRUN.exedescription pid process target process PID 392 wrote to memory of 4560 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 4560 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 4560 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 392 wrote to memory of 2088 392 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe PID 2088 wrote to memory of 1832 2088 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 2088 wrote to memory of 1832 2088 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 2088 wrote to memory of 1832 2088 a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe PID 1832 wrote to memory of 2224 1832 HKRUN.exe HKRUN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"2⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"C:\Users\Admin\AppData\Local\Temp\a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\HKRUN.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d
-
Filesize
219KB
MD569fe47844312a1dd8a8a4b64eace8bb0
SHA11080345aa844d9e0202aeb15f8299a961b35adad
SHA256a142716c38a65f2d71e8f1bea1c6f7f0b49f631d92ff70d719ca93cc11372b7f
SHA512d0409b6f448772ab97ce6395dd96a9490a13db8e5a14a642b5b28e184a5ada9b82c0f1142a6290c501b67adef8f8681142f5c49d32de6e48b06e1647f125c12d