Analysis
-
max time kernel
150s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
Resource
win10v2004-20221111-en
General
-
Target
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
-
Size
751KB
-
MD5
378cf525bbf5c7061467267a795d075c
-
SHA1
92c08cb5010d07e127f14a4eac5793b21528925b
-
SHA256
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127
-
SHA512
d3417463c1e22debe839cde336dd44a1e6067253ad02da767853167ac49cc4f977a7da97e05c80021cbd8efde9978d75c4cb0488d11c2a89baf59684bd08f52a
-
SSDEEP
12288:NJqC8p6x2r57DmkTd0ihm4XNzDU55JPvq+pGq/XS4zp0kC5QWvHU:NJb8fN2GdRmEzGPvq+pGq/XS4zp0k/
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1808-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1808-136-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1808-138-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1808-139-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13UFC8L5-WM67-5222-4TWT-JI2R0CJMWU50} 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13UFC8L5-WM67-5222-4TWT-JI2R0CJMWU50}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe\"" 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe" 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription pid process target process PID 3852 set thread context of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3468 4244 WerFault.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exedescription pid process target process PID 3852 wrote to memory of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 1808 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 4244 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 4244 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe PID 3852 wrote to memory of 4244 3852 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe 171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe"C:\Users\Admin\AppData\Local\Temp\171ad58a103d1423121271b010d0b630ce24d9e2645d8cf74bc49734190c7127.exe" g71c5j MDYXGSEDR 18082⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 3723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4244 -ip 42441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1808-132-0x0000000000000000-mapping.dmp
-
memory/1808-133-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1808-135-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1808-136-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1808-138-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1808-139-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3852-137-0x0000000002280000-0x0000000002285000-memory.dmpFilesize
20KB
-
memory/4244-134-0x0000000000000000-mapping.dmp