Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe
Resource
win10v2004-20220812-en
General
-
Target
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe
-
Size
140KB
-
MD5
82af750f8f9bf4aa423f22c1d1b5b6f0
-
SHA1
17e9cf1584526d086b38bfbcb327a67ea4e62bd1
-
SHA256
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741
-
SHA512
b6a2313766eba97b4da2ae8869e24a6a696d8dd59a46b772cdf1009e69e81ef0eb6efac352ce0951dc07f9e07867cb79a41df8cd2a2a4e749ff1752a5d1c0a42
-
SSDEEP
3072:SKQT3Slg2wZ8NZaiUwXTe2KHE+91oxaAu/Xiw7uQkXU:gDF83/Te2DbSiwqQGU
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/224-134-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/224-136-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/224-141-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3736-148-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
msc.exemsc.exepid process 3636 msc.exe 3736 msc.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
msc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2763105Q-PB70-6N85-ABQW-7B343K6K0CL2} msc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2763105Q-PB70-6N85-ABQW-7B343K6K0CL2}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\msc.exe\"" msc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ msc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\msc.exe" msc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exemsc.exedescription pid process target process PID 1376 set thread context of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 3636 set thread context of 3736 3636 msc.exe msc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exemsc.exepid process 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 3636 msc.exe 3636 msc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exemsc.exedescription pid process Token: SeDebugPrivilege 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe Token: SeDebugPrivilege 3636 msc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exemsc.exedescription pid process target process PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 1376 wrote to memory of 224 1376 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe PID 224 wrote to memory of 3636 224 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe msc.exe PID 224 wrote to memory of 3636 224 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe msc.exe PID 224 wrote to memory of 3636 224 670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe PID 3636 wrote to memory of 3736 3636 msc.exe msc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe"C:\Users\Admin\AppData\Local\Temp\670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe"C:\Users\Admin\AppData\Local\Temp\670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Roaming\Install\msc.exe-m "C:\Users\Admin\AppData\Local\Temp\670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Roaming\Install\msc.exe"C:\Users\Admin\AppData\Roaming\Install\msc.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD582af750f8f9bf4aa423f22c1d1b5b6f0
SHA117e9cf1584526d086b38bfbcb327a67ea4e62bd1
SHA256670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741
SHA512b6a2313766eba97b4da2ae8869e24a6a696d8dd59a46b772cdf1009e69e81ef0eb6efac352ce0951dc07f9e07867cb79a41df8cd2a2a4e749ff1752a5d1c0a42
-
Filesize
140KB
MD582af750f8f9bf4aa423f22c1d1b5b6f0
SHA117e9cf1584526d086b38bfbcb327a67ea4e62bd1
SHA256670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741
SHA512b6a2313766eba97b4da2ae8869e24a6a696d8dd59a46b772cdf1009e69e81ef0eb6efac352ce0951dc07f9e07867cb79a41df8cd2a2a4e749ff1752a5d1c0a42
-
Filesize
140KB
MD582af750f8f9bf4aa423f22c1d1b5b6f0
SHA117e9cf1584526d086b38bfbcb327a67ea4e62bd1
SHA256670a2c1b9bd9340f63a0e13278a45cb590a178a4b717bcf23770fca272b6c741
SHA512b6a2313766eba97b4da2ae8869e24a6a696d8dd59a46b772cdf1009e69e81ef0eb6efac352ce0951dc07f9e07867cb79a41df8cd2a2a4e749ff1752a5d1c0a42