Analysis
-
max time kernel
180s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
Resource
win10v2004-20221111-en
General
-
Target
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
-
Size
751KB
-
MD5
378cf525bbf5c7061467267a795d075c
-
SHA1
92c08cb5010d07e127f14a4eac5793b21528925b
-
SHA256
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127
-
SHA512
d3417463c1e22debe839cde336dd44a1e6067253ad02da767853167ac49cc4f977a7da97e05c80021cbd8efde9978d75c4cb0488d11c2a89baf59684bd08f52a
-
SSDEEP
12288:NJqC8p6x2r57DmkTd0ihm4XNzDU55JPvq+pGq/XS4zp0kC5QWvHU:NJb8fN2GdRmEzGPvq+pGq/XS4zp0k/
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1088-58-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1088-59-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1088-62-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1088-64-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13UFC8L5-WM67-5222-4TWT-JI2R0CJMWU50} 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13UFC8L5-WM67-5222-4TWT-JI2R0CJMWU50}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe\"" 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe" 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription pid process target process PID 576 set thread context of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1344 1552 WerFault.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription pid process target process PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1088 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1552 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1552 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1552 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 576 wrote to memory of 1552 576 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 1552 wrote to memory of 1344 1552 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe WerFault.exe PID 1552 wrote to memory of 1344 1552 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe WerFault.exe PID 1552 wrote to memory of 1344 1552 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe WerFault.exe PID 1552 wrote to memory of 1344 1552 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe" g71c5j MDYXGSEDR 10882⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 1643⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/576-54-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB
-
memory/576-63-0x0000000000250000-0x0000000000255000-memory.dmpFilesize
20KB
-
memory/1088-55-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1088-58-0x00000000004021DA-mapping.dmp
-
memory/1088-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1088-62-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1088-64-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1344-66-0x0000000000000000-mapping.dmp
-
memory/1552-60-0x0000000000000000-mapping.dmp