Analysis
-
max time kernel
124s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe
Resource
win10v2004-20220901-en
General
-
Target
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe
-
Size
734KB
-
MD5
764f2688a266ba3cab3a77dc7de911d0
-
SHA1
aabb78ced12f42e5e67d681ad0fcf26ae58b1e5d
-
SHA256
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5
-
SHA512
27f8bb9039d7c67af8dcc19f7b1ae5a7601e217a381683a4380ca97baa94bf1009d9a14dcd50e964edac6599c616a3666f1900a98b4af2a9e4b7ca496c93bc73
-
SSDEEP
12288:a8kBtlz25iIItGL94PiseTRp/3/6pVKw86hc/80c0eodG:17mGRrvQVK+hc/LpG
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3208-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3208-137-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3208-140-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3208-145-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3056-148-0x0000000000000000-mapping.dmp netwire behavioral2/memory/3056-158-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3056-159-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
public.exepublic.exepublic.exepid process 1444 public.exe 3040 public.exe 3056 public.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
public.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{I4MSD2OB-CD6T-M0LO-7O6O-E3573104K448} public.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{I4MSD2OB-CD6T-M0LO-7O6O-E3573104K448}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Users\\public.exe\"" public.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
public.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ public.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Users = "C:\\Users\\Admin\\AppData\\Roaming\\Users\\public.exe" public.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exepublic.exedescription pid process target process PID 4856 set thread context of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 1444 set thread context of 3056 1444 public.exe public.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exepublic.exedescription pid process target process PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 4856 wrote to memory of 3208 4856 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe PID 3208 wrote to memory of 1444 3208 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe public.exe PID 3208 wrote to memory of 1444 3208 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe public.exe PID 3208 wrote to memory of 1444 3208 27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe public.exe PID 1444 wrote to memory of 3040 1444 public.exe public.exe PID 1444 wrote to memory of 3040 1444 public.exe public.exe PID 1444 wrote to memory of 3040 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe PID 1444 wrote to memory of 3056 1444 public.exe public.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe"C:\Users\Admin\AppData\Local\Temp\27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe"C:\Users\Admin\AppData\Local\Temp\27e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\Users\public.exe"C:\Users\Admin\AppData\Roaming\Users\public.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\Users\public.exe"C:\Users\Admin\AppData\Roaming\Users\public.exe"4⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Roaming\Users\public.exe"C:\Users\Admin\AppData\Roaming\Users\public.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:3056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734KB
MD5764f2688a266ba3cab3a77dc7de911d0
SHA1aabb78ced12f42e5e67d681ad0fcf26ae58b1e5d
SHA25627e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5
SHA51227f8bb9039d7c67af8dcc19f7b1ae5a7601e217a381683a4380ca97baa94bf1009d9a14dcd50e964edac6599c616a3666f1900a98b4af2a9e4b7ca496c93bc73
-
Filesize
734KB
MD5764f2688a266ba3cab3a77dc7de911d0
SHA1aabb78ced12f42e5e67d681ad0fcf26ae58b1e5d
SHA25627e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5
SHA51227f8bb9039d7c67af8dcc19f7b1ae5a7601e217a381683a4380ca97baa94bf1009d9a14dcd50e964edac6599c616a3666f1900a98b4af2a9e4b7ca496c93bc73
-
Filesize
734KB
MD5764f2688a266ba3cab3a77dc7de911d0
SHA1aabb78ced12f42e5e67d681ad0fcf26ae58b1e5d
SHA25627e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5
SHA51227f8bb9039d7c67af8dcc19f7b1ae5a7601e217a381683a4380ca97baa94bf1009d9a14dcd50e964edac6599c616a3666f1900a98b4af2a9e4b7ca496c93bc73
-
Filesize
734KB
MD5764f2688a266ba3cab3a77dc7de911d0
SHA1aabb78ced12f42e5e67d681ad0fcf26ae58b1e5d
SHA25627e8103629b7e24e47e592b8c32708e491f013b06ca2ffaf6b042479a93b4cc5
SHA51227f8bb9039d7c67af8dcc19f7b1ae5a7601e217a381683a4380ca97baa94bf1009d9a14dcd50e964edac6599c616a3666f1900a98b4af2a9e4b7ca496c93bc73