Analysis

  • max time kernel
    185s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:52

General

  • Target

    df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053.exe

  • Size

    467KB

  • MD5

    03943957531a9b7ed0eca96e4337b4a2

  • SHA1

    39a4ee1d0f0fed3a81555b52fec030e913cb8563

  • SHA256

    df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053

  • SHA512

    cdf9beaf36313259cb56955bed0d23867e028ef064c00f2c09cfecd56126c8df520be9f4bd019ca61ac3ec03dbf73a9d802a6328ae4187804a16542c0ff451b2

  • SSDEEP

    6144:x32IXVi7TJZeXDUjwE1bYXP/XkwJXa8AkTqTVfQlHKJTJoleclZdmMO2:x3jg8YjwEFQ/XbXLr0NQBElmB

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053.exe
    "C:\Users\Admin\AppData\Local\Temp\df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      PID:2484
    • C:\Users\Admin\AppData\Local\Temp\df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053.exe
      C:\Users\Admin\AppData\Local\Temp\df1f93819545a92ed7acb5a67b3257dcdc4b3904e536fa856d27e7b29cc83053.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 312
        3⤵
        • Program crash
        PID:1636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 312
        3⤵
        • Program crash
        PID:4476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4812 -ip 4812
    1⤵
      PID:4668

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      Filesize

      81KB

      MD5

      fa05a001948f9d0a80c4936988c07826

      SHA1

      d9ae0aee938285b58983359ba1dda0684f00c96a

      SHA256

      42e91d228236187781427d929b813b08935ee791c35892803515abd6e04c8ac0

      SHA512

      1a791b7a2c42b189ee1464690cf0dddb4c7304f4b374506842c338a7eb2d5ebdbf1d020cb687fd29ed6a7ab63333cbcb60741d3142c282c4da852187c2ef05b1

    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      Filesize

      81KB

      MD5

      fa05a001948f9d0a80c4936988c07826

      SHA1

      d9ae0aee938285b58983359ba1dda0684f00c96a

      SHA256

      42e91d228236187781427d929b813b08935ee791c35892803515abd6e04c8ac0

      SHA512

      1a791b7a2c42b189ee1464690cf0dddb4c7304f4b374506842c338a7eb2d5ebdbf1d020cb687fd29ed6a7ab63333cbcb60741d3142c282c4da852187c2ef05b1

    • memory/700-132-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/700-133-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/700-142-0x0000000075230000-0x00000000757E1000-memory.dmp
      Filesize

      5.7MB

    • memory/1636-141-0x0000000000000000-mapping.dmp
    • memory/2484-134-0x0000000000000000-mapping.dmp
    • memory/4812-137-0x0000000000000000-mapping.dmp
    • memory/4812-138-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/4812-140-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB