Analysis
-
max time kernel
172s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
NisSrv.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
NisSrv.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
circular_29092022.pdf
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
circular_29092022.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
circular_29092022.pdf.lnk
Resource
win7-20220901-en
General
-
Target
NisSrv.exe
-
Size
584KB
-
MD5
85f14631181a8867a2d41122482ba8dc
-
SHA1
8e2f2bce824c97cb8dd83c1736cd1de6897bb054
-
SHA256
bbcca0dc10b700c01e557612f009c050ca618f227e0b8be3d4f471dd9d887a18
-
SHA512
aec36afdc33880622492010ed028e679778abb8470a8e9517f8c241de0f8a158da3ce1c767e7671b5aab14c77624009e05af35472eb0d6c2e411918756f4d855
-
SSDEEP
6144:6toWmFzltNCF9NuUzSa3YYcahynDzcjzH1DFKH3oGu8EdoXRXHd:6toNFZj4QySHYca0UjzVDFKH3ox5y3
Malware Config
Extracted
netwire
54.145.6.146:443
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
MSOffice-%Rand%
-
lock_executable
false
-
mutex
IERXehpS
-
offline_keylogger
false
-
password
a1cap0ne@1960s
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1004-138-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1004-139-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1004-140-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1004-141-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NisSrv.exedescription pid process target process PID 2912 set thread context of 1004 2912 NisSrv.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
NisSrv.exepid process 2912 NisSrv.exe 2912 NisSrv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
NisSrv.exedescription pid process Token: SeDebugPrivilege 2912 NisSrv.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
NisSrv.exedescription pid process target process PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe PID 2912 wrote to memory of 1004 2912 NisSrv.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NisSrv.exe"C:\Users\Admin\AppData\Local\Temp\NisSrv.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1004-137-0x0000000000000000-mapping.dmp
-
memory/1004-138-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1004-139-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1004-140-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1004-141-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/2912-132-0x0000000000030000-0x00000000000C8000-memory.dmpFilesize
608KB
-
memory/2912-133-0x0000000004B20000-0x0000000004BBC000-memory.dmpFilesize
624KB
-
memory/2912-134-0x0000000008350000-0x00000000088F4000-memory.dmpFilesize
5.6MB
-
memory/2912-135-0x00000000080C0000-0x0000000008152000-memory.dmpFilesize
584KB
-
memory/2912-136-0x0000000008070000-0x000000000807A000-memory.dmpFilesize
40KB