Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 15:58

General

  • Target

    2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe

  • Size

    660KB

  • MD5

    aa6c131a2153775c37450f522316cbef

  • SHA1

    51d28f3c179ee28a555ff78b7ba265149d1d0548

  • SHA256

    2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d

  • SHA512

    17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62

  • SSDEEP

    12288:+hM2Q557Tu3XDG26Cw6q/x0PIyGtG+x2B9DaiiVIovI0hI+Cl8x:0Q5F4G2Xw6Fe2B9eXzvx3T

Malware Config

Extracted

Family

netwire

C2

servr.jordangaming3.xyz:3370

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    KmDGtNEp

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    Windows Defender

  • use_mutex

    true

Signatures

  • NetWire RAT payload 6 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe
    "C:\Users\Admin\AppData\Local\Temp\2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZqCpvOTXTOGWy.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4936
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZqCpvOTXTOGWy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BC9.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4452
    • C:\Users\Admin\AppData\Local\Temp\2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe
      "C:\Users\Admin\AppData\Local\Temp\2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3940
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Looks for VirtualBox Guest Additions in registry
        • Executes dropped EXE
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Checks computer location settings
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3720
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZqCpvOTXTOGWy.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:700
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZqCpvOTXTOGWy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp97C.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:4028
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    fe043fa0d27521fed6d5edbb87f25e44

    SHA1

    5391e51917c1847b008225bdbf0ae1bef9b34ddf

    SHA256

    194fdaeae98f10e42c2a65193fa1eafc67a463a1ca66a362a8655649e552e6f0

    SHA512

    f9dbb80c35d48f43ba893afe25bae47e9e83202f519fd94bca3265de0944277fd3f328f255f121023c455b1c4dd907225f076d5883793bedbf35f1fef28bb00b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    bd48dc068211d27ae1a4cafb73ba7d5a

    SHA1

    ee83e3aaa3fe40804bcf527561103c6823293960

    SHA256

    2021a9dd3eb751cd4180b2682903ecf205378caa639f01a3c25757e3813bc1ff

    SHA512

    1243815cc99536cee8b4b4dc9c0e876d30261f623e500683582d9199accf00fbda3c71d8276c01f483af7c2fd825149643959c4ed77843256b652a2dc7640b81

  • C:\Users\Admin\AppData\Local\Temp\tmp4BC9.tmp

    Filesize

    1KB

    MD5

    46613ef168a2384b2987454251fb0269

    SHA1

    321fdc3a29dc9ccfe974dc02a40915b62f6ada10

    SHA256

    63e192e9b656df6a72d8bbe47bb4039864ce0ca640cb6a84beb857f30d8959e2

    SHA512

    a61c8e8c411b5a33bffa07162c4b3b3db2a7f2815fbf985c23cc5a9b06be0430cc6a27bc3e94bfff0bcd9fa5df682d2a56616626d51af8b73c8cbaf8c1051700

  • C:\Users\Admin\AppData\Local\Temp\tmp97C.tmp

    Filesize

    1KB

    MD5

    46613ef168a2384b2987454251fb0269

    SHA1

    321fdc3a29dc9ccfe974dc02a40915b62f6ada10

    SHA256

    63e192e9b656df6a72d8bbe47bb4039864ce0ca640cb6a84beb857f30d8959e2

    SHA512

    a61c8e8c411b5a33bffa07162c4b3b3db2a7f2815fbf985c23cc5a9b06be0430cc6a27bc3e94bfff0bcd9fa5df682d2a56616626d51af8b73c8cbaf8c1051700

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    660KB

    MD5

    aa6c131a2153775c37450f522316cbef

    SHA1

    51d28f3c179ee28a555ff78b7ba265149d1d0548

    SHA256

    2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d

    SHA512

    17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    660KB

    MD5

    aa6c131a2153775c37450f522316cbef

    SHA1

    51d28f3c179ee28a555ff78b7ba265149d1d0548

    SHA256

    2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d

    SHA512

    17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    660KB

    MD5

    aa6c131a2153775c37450f522316cbef

    SHA1

    51d28f3c179ee28a555ff78b7ba265149d1d0548

    SHA256

    2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d

    SHA512

    17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62

  • memory/700-180-0x0000000075570000-0x00000000755BC000-memory.dmp

    Filesize

    304KB

  • memory/2452-157-0x0000000071350000-0x000000007139C000-memory.dmp

    Filesize

    304KB

  • memory/2452-162-0x00000000070C0000-0x0000000007156000-memory.dmp

    Filesize

    600KB

  • memory/2452-139-0x0000000002220000-0x0000000002256000-memory.dmp

    Filesize

    216KB

  • memory/2452-140-0x0000000004DF0000-0x0000000005418000-memory.dmp

    Filesize

    6.2MB

  • memory/2452-161-0x0000000006EA0000-0x0000000006EAA000-memory.dmp

    Filesize

    40KB

  • memory/2452-160-0x0000000006E30000-0x0000000006E4A000-memory.dmp

    Filesize

    104KB

  • memory/2452-142-0x0000000004C20000-0x0000000004C86000-memory.dmp

    Filesize

    408KB

  • memory/2452-141-0x0000000004B80000-0x0000000004BA2000-memory.dmp

    Filesize

    136KB

  • memory/2452-154-0x0000000005B30000-0x0000000005B4E000-memory.dmp

    Filesize

    120KB

  • memory/2452-155-0x00000000060E0000-0x0000000006112000-memory.dmp

    Filesize

    200KB

  • memory/2748-132-0x0000000000B20000-0x0000000000BC8000-memory.dmp

    Filesize

    672KB

  • memory/2748-133-0x0000000005A60000-0x0000000006004000-memory.dmp

    Filesize

    5.6MB

  • memory/2748-134-0x0000000005590000-0x0000000005622000-memory.dmp

    Filesize

    584KB

  • memory/2748-135-0x0000000005720000-0x000000000572A000-memory.dmp

    Filesize

    40KB

  • memory/2748-136-0x0000000007E60000-0x0000000007EFC000-memory.dmp

    Filesize

    624KB

  • memory/2748-138-0x0000000008170000-0x00000000081D6000-memory.dmp

    Filesize

    408KB

  • memory/3720-179-0x0000000075570000-0x00000000755BC000-memory.dmp

    Filesize

    304KB

  • memory/3940-147-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3940-149-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3940-153-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4936-163-0x0000000007A10000-0x0000000007A1E000-memory.dmp

    Filesize

    56KB

  • memory/4936-156-0x0000000071350000-0x000000007139C000-memory.dmp

    Filesize

    304KB

  • memory/4936-165-0x0000000007B00000-0x0000000007B08000-memory.dmp

    Filesize

    32KB

  • memory/4936-164-0x0000000007B10000-0x0000000007B2A000-memory.dmp

    Filesize

    104KB

  • memory/4936-159-0x0000000007E20000-0x000000000849A000-memory.dmp

    Filesize

    6.5MB

  • memory/4936-158-0x0000000006A70000-0x0000000006A8E000-memory.dmp

    Filesize

    120KB

  • memory/4980-177-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4980-178-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4980-182-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB