Analysis

  • max time kernel
    120s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 22:21

General

  • Target

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0.exe

  • Size

    175KB

  • MD5

    6aa0e97bec377f4c535c4173f6c256a7

  • SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

  • SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

  • SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • SSDEEP

    3072:P4sye0QXZRRDmlglKsXZ19qkGDfpzfhCLGVPUuycMB:wsy7AFygweZ7v6fdhQGhU19

Malware Config

Signatures

  • NetWire RAT payload 9 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0.exe
    "C:\Users\Admin\AppData\Local\Temp\13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0.exe
      "C:\Users\Admin\AppData\Local\Temp\13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
        "C:\Users\Admin\AppData\Roaming\Folder\winkey.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
          "C:\Users\Admin\AppData\Roaming\Folder\winkey.exe"
          4⤵
          • Executes dropped EXE
          PID:848
        • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
          "C:\Users\Admin\AppData\Roaming\Folder\winkey.exe"
          4⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Loads dropped DLL
          • Adds Run key to start application
          PID:556

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B90B117906B8A74C79D1BC450C2B94B1_A54F26A8A41DE52C237D54D67F12793F
    Filesize

    1KB

    MD5

    511db66daf1be9720dcac760ca8efe02

    SHA1

    fe5430c8452cd37d68080cd0b58a1fdcfaaa7ce7

    SHA256

    df0e3c2c6d0bc7e8a6adb9b6fba0c8d04db663af2e7cbaea9e0c9c53760e1e1d

    SHA512

    c4c51f525201a6c847ad193b4db817d2a1b1e934b5f134a0f0c860ba1953626ec6654542d49b38fbb0d118b17bea1cc2a7420c16d8a3cf617a5cba9cb968c801

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F4D9C889B7AEBCF4E1A2DAABC5C3628A_8575EEAFBE385FF14EE35EA7147E2C76
    Filesize

    509B

    MD5

    bd984e33d42f49505c76ba91f6eb687d

    SHA1

    f140c9e802ab1f7b5da793aa69b73a88665c2e80

    SHA256

    54af2b435b3273739116a83b15fb09b962686ed737cb509179f17ff659797b49

    SHA512

    4a54f0b01169b9114729d7119b9426a208c22110e56c904b4b642a1d2e0870c3515b2809791fcce54c006501507a8380a0b08f22987562173f9cad9bd3d0e3c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fdec4a1c3994339d5d62d221b2d67ca3

    SHA1

    bbf0dbc51a4b8ad248ad789915ea0aa65ca924f0

    SHA256

    6f2ef8e6c5d7638c6d6c62d971f5df63ccf684cc3277e312737f03628b25cc0a

    SHA512

    f515f4613919324009e0f5bfbb13e88c538f925617e52bdaeca022fc7b64f598090beecad9c7a0dfab2a033e491d33a54ec172deea951d1dfb0534dcc972ae44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B90B117906B8A74C79D1BC450C2B94B1_A54F26A8A41DE52C237D54D67F12793F
    Filesize

    500B

    MD5

    9213f167f2983611d0d26de0539e52b8

    SHA1

    317173b5bbf11ddaee7d9c1962ed880c9dffcf5d

    SHA256

    d07ba7b938c2698f03ed91f3340d1d73b5fabf74a114faa473070a2f709465ee

    SHA512

    6017b8e29f6a5ca68544c35cf898a1cc3edc2448ad50348ff9b68cdeb9c9c7c2d454e22ec6cf935eff451e3741e97373901f415580023b741f84309f46f58865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F4D9C889B7AEBCF4E1A2DAABC5C3628A_8575EEAFBE385FF14EE35EA7147E2C76
    Filesize

    490B

    MD5

    249d541694343b0d8e95bef08469ea0f

    SHA1

    0b37a0a94095576120177c8028bb25409f2ce4ed

    SHA256

    58a7c366543f21b920acc95900d94ff998945e3697ffbeac00bed058a3427c0c

    SHA512

    3f03e49d2ce7cb4ec6b90e61fb6d7c6a7f221fd9f8f438dca51793d9905c863719e7c32bb2de50725e0e1329ed795f729e61265f98a82569045b65f6197dad5e

  • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • C:\Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • \Users\Admin\AppData\Roaming\Folder\winkey.exe
    Filesize

    175KB

    MD5

    6aa0e97bec377f4c535c4173f6c256a7

    SHA1

    d6c4a2d49f3dbfe80a273da580b076a510a88c18

    SHA256

    13cea6d656bcb5b411cb752db32350c51ce1e6794b75de96bdb20efe6ea4ceb0

    SHA512

    ff024f1848816aa385986e6abb8040f329a9d6ceafb28db3d7ffe40e3509a82a3239c84df1c0173ac4eedc61f434da4654db60e7db3b4f714fdb3cec2722fac2

  • memory/556-105-0x0000000000402196-mapping.dmp
  • memory/556-115-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/556-116-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1252-54-0x0000000076381000-0x0000000076383000-memory.dmp
    Filesize

    8KB

  • memory/1252-55-0x00000000743E0000-0x000000007498B000-memory.dmp
    Filesize

    5.7MB

  • memory/1252-73-0x00000000743E0000-0x000000007498B000-memory.dmp
    Filesize

    5.7MB

  • memory/1532-85-0x0000000074390000-0x000000007493B000-memory.dmp
    Filesize

    5.7MB

  • memory/1532-108-0x0000000074390000-0x000000007493B000-memory.dmp
    Filesize

    5.7MB

  • memory/1532-76-0x0000000000000000-mapping.dmp
  • memory/1684-68-0x0000000000402196-mapping.dmp
  • memory/1684-77-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-66-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-74-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-57-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-56-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-71-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-59-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1684-62-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB