Analysis

  • max time kernel
    185s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:28

General

  • Target

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe

  • Size

    193KB

  • MD5

    b87bf62b4846f5269f6d64ae2d75ff14

  • SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

  • SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

  • SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • SSDEEP

    6144:kNWh6VjKOGLKkqheTcY6b35k8Mmhf5m0U:AjPGCeTcY6b3bMM5

Malware Config

Signatures

  • NetWire RAT payload 10 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe
    "C:\Users\Admin\AppData\Local\Temp\57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe
      "C:\Users\Admin\AppData\Local\Temp\57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        -m "C:\Users\Admin\AppData\Local\Temp\57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1912
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"
          4⤵
          • Executes dropped EXE
          PID:1792

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • \Users\Admin\AppData\Roaming\Install\Host.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    16KB

    MD5

    ed1b702a5f7438b5e5367c593cdabc18

    SHA1

    bbff6d30646258a4fa45db70e8832c7a209e523b

    SHA256

    8817afe4d33513ce8f7de3904a77c062a736806d6e94c70341398cb2d1a3d3e4

    SHA512

    dcf0289078fd05ac0820804fddf85660b8550972911db79c2dd7d8ffb6ebb63b96f7851cf4ebc7780c9fca8e1351d440258b8326c6ed20e6ce5e69ac9b416f07

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    193KB

    MD5

    b87bf62b4846f5269f6d64ae2d75ff14

    SHA1

    510c10e170a0c2e7199bddecde925e9412d69c5b

    SHA256

    57842c793bb7e85d0056595b2b1ba36f87b7e2b805ab7de9709b75d33b9368ac

    SHA512

    92b041718f5a517f045c2cb45ce76bbc59de41777e3cd19574152b178e3754fc6b03686280ee17ed288396388f6f15e10124a8248dff646e501ebf0b31f2710d

  • memory/1256-86-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1256-71-0x0000000000000000-mapping.dmp
  • memory/1256-93-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1256-88-0x0000000000495000-0x00000000004A6000-memory.dmp
    Filesize

    68KB

  • memory/1436-112-0x0000000000000000-mapping.dmp
  • memory/1436-133-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1436-131-0x00000000002F5000-0x0000000000306000-memory.dmp
    Filesize

    68KB

  • memory/1436-130-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1764-65-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-66-0x00000000004021DA-mapping.dmp
  • memory/1764-63-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-61-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-69-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-73-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-58-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1764-59-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1792-132-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1792-134-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1792-124-0x00000000004021DA-mapping.dmp
  • memory/1912-106-0x00000000004021DA-mapping.dmp
  • memory/1912-129-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1920-56-0x00000000003B5000-0x00000000003C6000-memory.dmp
    Filesize

    68KB

  • memory/1920-95-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1920-54-0x0000000076181000-0x0000000076183000-memory.dmp
    Filesize

    8KB

  • memory/1920-96-0x00000000003B5000-0x00000000003C6000-memory.dmp
    Filesize

    68KB

  • memory/1920-55-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/1920-57-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/2016-97-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/2016-89-0x00000000002E5000-0x00000000002F6000-memory.dmp
    Filesize

    68KB

  • memory/2016-87-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/2016-75-0x0000000000000000-mapping.dmp
  • memory/2016-92-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/2044-90-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB

  • memory/2044-91-0x0000000000B25000-0x0000000000B36000-memory.dmp
    Filesize

    68KB

  • memory/2044-83-0x0000000000000000-mapping.dmp
  • memory/2044-94-0x0000000074FB0000-0x000000007555B000-memory.dmp
    Filesize

    5.7MB