Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 00:14

General

  • Target

    8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe

  • Size

    376KB

  • MD5

    459a9784acc3b399353d69f2fa3f8b5b

  • SHA1

    5e5e865827862a57962f8e35b09d9bd13743e468

  • SHA256

    8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

  • SHA512

    69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

  • SSDEEP

    3072:LMiftEtorupusNhKBCMLxOAHIxc+4ywEQ2qTHah6YwqsXRmp8l3C8xpayOKOH:LlWtM6hKoInIxc+4Z9aQTmuh7va5pH

Malware Config

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe
    "C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\SysWOW64\cmd.exe
      /c net stop MpsSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
            PID:2264
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        2⤵
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3404
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m C:\Program Files (x86)\Internet Explorer\iexplore.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -m C:\Program Files (x86)\Internet Explorer\iexplore.exe
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2248
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4824
      • C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe
        C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3684
          • C:\Windows\SysWOW64\cmd.exe
            /c net stop MpsSvc
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4084
            • C:\Windows\SysWOW64\net.exe
              net stop MpsSvc
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop MpsSvc
                6⤵
                  PID:3728
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              4⤵
                PID:220
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 84
                  5⤵
                  • Program crash
                  PID:4012
              • C:\Users\Admin\AppData\Roaming\Install\Host.exe
                C:\Users\Admin\AppData\Roaming\Install\Host.exe
                4⤵
                • Executes dropped EXE
                • Modifies Installed Components in the registry
                • Adds Run key to start application
                PID:3980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 220 -ip 220
          1⤵
            PID:4780

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          2
          T1060

          Defense Evasion

          Modify Registry

          3
          T1112

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
            Filesize

            1KB

            MD5

            fe56e8724f14ce1f3b7aefb4a62b0c16

            SHA1

            bdac2e002becfc2b8ffca0973540fa2851d21ebd

            SHA256

            3d06f4d78345d522e29652ada389e858ed290fcf2b3b783b1009f0525d55c7a4

            SHA512

            a5c18aeb916a3d1c68289c1b54a2e2269834bc8cd0df3702e98a4d0d480d74ff1cb663b184de89938f1d9c357d05e075ad27cd2f4bc09e02cd213c1fffb27950

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            Filesize

            471B

            MD5

            33b7e09d1c6e875887fd38ae0a7ee659

            SHA1

            192864bc83504fafbd87af8c3834b835076c414a

            SHA256

            f200eaab5663e542461bbae7aac0473f6455eec451011f016c84920520b19dfb

            SHA512

            b1d6872519f5956bb511b4eca8e1b79123482e9aacb1cef704c1d3ef7f9daade10573dd206df4c62c623bbfb10f757f01c914bfc2b0e9ab567981ea08b404799

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
            Filesize

            446B

            MD5

            a72d70761b62d83237e2f5df550a43bd

            SHA1

            b61b5ac53b50499cca368a04c47b0ddc8c80e622

            SHA256

            7ab93ef8d9ff01bb2bc3aa761c24b1c199d562a923a3bbcb0b0c98dcb3c0feb5

            SHA512

            7b35350654ec75a409491f17d21d75d20bf479407c9387108cc27f5945d3277e974c2ceacde5441c2999338714dedb6ae659dc86ff0aff41d00f9acd87dae1f3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            Filesize

            434B

            MD5

            f2f0d7b44b0e45abe717b0876cdd5328

            SHA1

            7b9c983349c23fb67181f800727b120db78e2449

            SHA256

            8147488d67d99c8acadde0f988f84976336ebb50a15af5303a83f955d6ffd0c7

            SHA512

            2cc366ef7cd95c35ee4b53b6d08a230c2d1e9509f721b0b64afed017092003386badde970eb89469a5c4a7fe14c24e960a41417bcda121eda2a1a2ec0182836b

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
            Filesize

            4KB

            MD5

            425c6b02ddffe84ed68af9bb0febae53

            SHA1

            9ab1e1553fee6f088bea23cece669ad4d00bd360

            SHA256

            929d6ba5648ce8ce15ddb1028ff660299fe1a2c3e2cb4d725c26696a5113f1b0

            SHA512

            2909ff6d06706186c732d9c7d142e907b6779c7e08352c7a106c13c21501d7fca43bdffbd846d82d7cf22bb5dd0f24fcf0e2b324732aff2bf27d92f17b960310

          • C:\Users\Admin\AppData\Local\Temp\8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb.exe
            Filesize

            376KB

            MD5

            459a9784acc3b399353d69f2fa3f8b5b

            SHA1

            5e5e865827862a57962f8e35b09d9bd13743e468

            SHA256

            8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

            SHA512

            69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            Filesize

            814KB

            MD5

            5e5f63cd0ca3ee94c61a2db20ce33fc9

            SHA1

            c90ea9645c7cc1ad7553675a7ecdf880b1fb4621

            SHA256

            219280ffebd3d771102fc3a7f26529e5e9161366e3a5de2f8943d81dda7756bf

            SHA512

            b36df698f1cbe52df754db9fcfba7e6811b6fc74f44a89378ce29356630f66a10d526402e9d133f8ab608bb614e2214945c0b732b4db3d0cad3d3665e062edcb

          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            Filesize

            376KB

            MD5

            459a9784acc3b399353d69f2fa3f8b5b

            SHA1

            5e5e865827862a57962f8e35b09d9bd13743e468

            SHA256

            8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

            SHA512

            69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            Filesize

            376KB

            MD5

            459a9784acc3b399353d69f2fa3f8b5b

            SHA1

            5e5e865827862a57962f8e35b09d9bd13743e468

            SHA256

            8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

            SHA512

            69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            Filesize

            376KB

            MD5

            459a9784acc3b399353d69f2fa3f8b5b

            SHA1

            5e5e865827862a57962f8e35b09d9bd13743e468

            SHA256

            8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

            SHA512

            69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            Filesize

            376KB

            MD5

            459a9784acc3b399353d69f2fa3f8b5b

            SHA1

            5e5e865827862a57962f8e35b09d9bd13743e468

            SHA256

            8deb6d11e709d78039023f7e935791d31c93846c1991c33dd061595499863feb

            SHA512

            69c67f2f337955a1d7a90e0a497b8063ff1c3aa39bb4df8409be785b5201a6a86f59842b296bfd01e9258f3c3bb254b75ebf77477cdf2f7bb0dfd0c99509a41c

          • memory/2164-149-0x0000000000000000-mapping.dmp
          • memory/2264-135-0x0000000000000000-mapping.dmp
          • memory/2376-136-0x0000000000000000-mapping.dmp
          • memory/3508-134-0x0000000000000000-mapping.dmp
          • memory/3684-144-0x0000000000000000-mapping.dmp
          • memory/3728-150-0x0000000000000000-mapping.dmp
          • memory/3980-151-0x0000000000000000-mapping.dmp
          • memory/3980-156-0x0000000000400000-0x0000000000417000-memory.dmp
            Filesize

            92KB

          • memory/3980-158-0x0000000000400000-0x0000000000417000-memory.dmp
            Filesize

            92KB

          • memory/4084-148-0x0000000000000000-mapping.dmp
          • memory/4376-133-0x0000000003900000-0x0000000003904000-memory.dmp
            Filesize

            16KB

          • memory/4596-132-0x0000000000000000-mapping.dmp
          • memory/4660-146-0x0000000000400000-0x0000000000417000-memory.dmp
            Filesize

            92KB

          • memory/4660-142-0x0000000000400000-0x0000000000417000-memory.dmp
            Filesize

            92KB

          • memory/4660-139-0x0000000000400000-0x0000000000417000-memory.dmp
            Filesize

            92KB

          • memory/4660-138-0x0000000000000000-mapping.dmp