Analysis
-
max time kernel
143s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 04:35
Static task
static1
General
-
Target
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe
-
Size
793KB
-
MD5
3f2a653458d88060d8e2dcfde4a2b396
-
SHA1
8b514d159d3aad5ed0eb8b0b5ee7db53e183738e
-
SHA256
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d
-
SHA512
a4be00914fe7719d7983997e211fe1869eea4a09e31fb40989bb87c325053d76908d70173154713e8fe617739c4559759f1521333646b5d9e1a53c64cb0656a1
-
SSDEEP
12288:RejUauu2iNaLrA7Ed3Oml1OktIQvRCUKPnN5CdTenWlCqjJ5nS4TU41WjZfX6SyG:Mjzuu1QSEd3OmTO8IQvRZKPNa0WrjrS
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3552-140-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/3552-141-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/3552-142-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/3552-143-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/3552-147-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1940 Host.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exeaf18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exedescription pid process target process PID 4904 set thread context of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exepid process 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exedescription pid process Token: SeDebugPrivilege 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exeaf18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exedescription pid process target process PID 4904 wrote to memory of 2756 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe schtasks.exe PID 4904 wrote to memory of 2756 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe schtasks.exe PID 4904 wrote to memory of 2756 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe schtasks.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 4904 wrote to memory of 3552 4904 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe PID 3552 wrote to memory of 1940 3552 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe Host.exe PID 3552 wrote to memory of 1940 3552 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe Host.exe PID 3552 wrote to memory of 1940 3552 af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe"C:\Users\Admin\AppData\Local\Temp\af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpaItRCg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6F01.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d.exe"{path}"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6F01.tmpFilesize
1KB
MD56a6bfbcd5a3edf4c9b6ee5176de88025
SHA16b498daeeefdc9988977fd32cd9fda1b714117f6
SHA2564bcd0ee26f24f38ce6eea1cdf753208af1d8bd271dc936dbb3a5ea138308dad9
SHA51203b53e846ae2ecbf5204994365e03e804f3aa50016c1917257c82ba0d18b7cb9e2c61f161f05c086b50ffb5e35cc5c67d920f5d5dc044c706b442f5c76d6fd50
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
793KB
MD53f2a653458d88060d8e2dcfde4a2b396
SHA18b514d159d3aad5ed0eb8b0b5ee7db53e183738e
SHA256af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d
SHA512a4be00914fe7719d7983997e211fe1869eea4a09e31fb40989bb87c325053d76908d70173154713e8fe617739c4559759f1521333646b5d9e1a53c64cb0656a1
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
793KB
MD53f2a653458d88060d8e2dcfde4a2b396
SHA18b514d159d3aad5ed0eb8b0b5ee7db53e183738e
SHA256af18d799c7288fc034106f041f1595591719fb64adebebc3f78b634229a7f83d
SHA512a4be00914fe7719d7983997e211fe1869eea4a09e31fb40989bb87c325053d76908d70173154713e8fe617739c4559759f1521333646b5d9e1a53c64cb0656a1
-
memory/1940-144-0x0000000000000000-mapping.dmp
-
memory/2756-137-0x0000000000000000-mapping.dmp
-
memory/3552-140-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/3552-139-0x0000000000000000-mapping.dmp
-
memory/3552-141-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/3552-142-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/3552-143-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/3552-147-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/4904-136-0x0000000007E40000-0x0000000007E4A000-memory.dmpFilesize
40KB
-
memory/4904-132-0x0000000000EF0000-0x0000000000FBC000-memory.dmpFilesize
816KB
-
memory/4904-135-0x0000000007F00000-0x0000000007F9C000-memory.dmpFilesize
624KB
-
memory/4904-134-0x0000000007E60000-0x0000000007EF2000-memory.dmpFilesize
584KB
-
memory/4904-133-0x0000000008330000-0x00000000088D4000-memory.dmpFilesize
5.6MB