Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 07:29

General

  • Target

    fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe

  • Size

    105KB

  • MD5

    e11591310952d9c6eeeaf88ff19432b2

  • SHA1

    71bd602670f33e1f0573c6bbd15ead0992e4973f

  • SHA256

    fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53

  • SHA512

    e8ff1f1766d49736549a5792a613f4e9776de534c2eca1e172de29af3a94a407d568020ece86e6f6d2381c47ea23b0e3e025e1a84f4a2c651c171fb240ec9b07

  • SSDEEP

    3072:gM1BjoYNXoKDIJBXJPLW1D9DOgDqK2VRNbA/6A/d:gMMYNXqBBCN9DOgOK2VzbVA/d

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe
    "C:\Users\Admin\AppData\Local\Temp\fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe
      "C:\Users\Admin\AppData\Local\Temp\fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        -m "C:\Users\Admin\AppData\Local\Temp\fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          PID:2288

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nskBC22.tmp\acosmists.dll
    Filesize

    44KB

    MD5

    556cc3600c86ea1383f036fbc13b617d

    SHA1

    cf5c93b117321411c2ba16b24a29f940cf01926c

    SHA256

    58f18a822473ff36370b7a0991304a413010819b7c1881c5b637e8747aff86b3

    SHA512

    0380629798e50628139ab040622be41af252e57fad1510b2bce61eadcf66743bced2c1e15f49dcef7c296f4a00c9a67c97926c94e2e127767df2f4de9f21f71b

  • C:\Users\Admin\AppData\Local\Temp\nsyC4AD.tmp\acosmists.dll
    Filesize

    44KB

    MD5

    556cc3600c86ea1383f036fbc13b617d

    SHA1

    cf5c93b117321411c2ba16b24a29f940cf01926c

    SHA256

    58f18a822473ff36370b7a0991304a413010819b7c1881c5b637e8747aff86b3

    SHA512

    0380629798e50628139ab040622be41af252e57fad1510b2bce61eadcf66743bced2c1e15f49dcef7c296f4a00c9a67c97926c94e2e127767df2f4de9f21f71b

  • C:\Users\Admin\AppData\Roaming\DISK2.DSK
    Filesize

    81KB

    MD5

    3d144aebb15820aa8af4033c00a419a6

    SHA1

    6c82768036cbbba492af14d6fab5a7a675ee1d6e

    SHA256

    5e85e55ade3b763209938fbb34c1fbd16007737428ac51891745f35bd80fc09a

    SHA512

    74aaa5db6dd80f02c816aec70d90b1f9bf9c5af8000adec8676fb8f92216754132ba0b2fdca61366a06d6b7bb57833017c924bf6d87feda4a648ff78e2dd1972

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    105KB

    MD5

    e11591310952d9c6eeeaf88ff19432b2

    SHA1

    71bd602670f33e1f0573c6bbd15ead0992e4973f

    SHA256

    fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53

    SHA512

    e8ff1f1766d49736549a5792a613f4e9776de534c2eca1e172de29af3a94a407d568020ece86e6f6d2381c47ea23b0e3e025e1a84f4a2c651c171fb240ec9b07

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    105KB

    MD5

    e11591310952d9c6eeeaf88ff19432b2

    SHA1

    71bd602670f33e1f0573c6bbd15ead0992e4973f

    SHA256

    fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53

    SHA512

    e8ff1f1766d49736549a5792a613f4e9776de534c2eca1e172de29af3a94a407d568020ece86e6f6d2381c47ea23b0e3e025e1a84f4a2c651c171fb240ec9b07

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    105KB

    MD5

    e11591310952d9c6eeeaf88ff19432b2

    SHA1

    71bd602670f33e1f0573c6bbd15ead0992e4973f

    SHA256

    fc361bfc9536f31350c99e5bffc007477e6ac9d1bc1fee3604c8fcae39153e53

    SHA512

    e8ff1f1766d49736549a5792a613f4e9776de534c2eca1e172de29af3a94a407d568020ece86e6f6d2381c47ea23b0e3e025e1a84f4a2c651c171fb240ec9b07

  • memory/1480-137-0x0000000000000000-mapping.dmp
  • memory/2288-148-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2288-143-0x0000000000000000-mapping.dmp
  • memory/4500-136-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4500-139-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4500-134-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4500-133-0x0000000000000000-mapping.dmp