Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:37

General

  • Target

    0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe

  • Size

    218KB

  • MD5

    9e90b8196b1979b337be4c7c24111f7f

  • SHA1

    0834f7c90373e59abdba656e8a73502c664e7534

  • SHA256

    0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef

  • SHA512

    b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db

  • SSDEEP

    3072:XOvK93lmpPX2yKCL4Z/0BCpmSmSDByjivPPyY1GQ62VGNAj:XjMPX2yK1/qsmSmSDUuHKH/

Malware Config

Signatures

  • NetWire RAT payload 7 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe
    "C:\Users\Admin\AppData\Local\Temp\0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
      2⤵
      • Drops file in Windows directory
      PID:1644
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
          4⤵
          • Drops file in Windows directory
          PID:1064
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    14KB

    MD5

    9de341ca4dd62774ec3879337522e491

    SHA1

    682db3ba6f088d73351a8d6fd728632f1bbd4653

    SHA256

    43482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337

    SHA512

    8d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    14KB

    MD5

    9de341ca4dd62774ec3879337522e491

    SHA1

    682db3ba6f088d73351a8d6fd728632f1bbd4653

    SHA256

    43482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337

    SHA512

    8d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    14KB

    MD5

    9de341ca4dd62774ec3879337522e491

    SHA1

    682db3ba6f088d73351a8d6fd728632f1bbd4653

    SHA256

    43482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337

    SHA512

    8d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    218KB

    MD5

    9e90b8196b1979b337be4c7c24111f7f

    SHA1

    0834f7c90373e59abdba656e8a73502c664e7534

    SHA256

    0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef

    SHA512

    b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    218KB

    MD5

    9e90b8196b1979b337be4c7c24111f7f

    SHA1

    0834f7c90373e59abdba656e8a73502c664e7534

    SHA256

    0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef

    SHA512

    b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier
    Filesize

    68B

    MD5

    714852b1746e49b7bfee3f968522bfae

    SHA1

    7eb88076c9ab442b2c33b8f1049d7c9a4ce64f35

    SHA256

    18d5efa351d7b96544f11865f18d3d2e54820ad7580497a4f4b8c7b622125219

    SHA512

    855779ff9761754af4829caf145638bc7623fca6cd0c49370fb0c41ea6d4f333f3b6060e77b9d2f6876d732914cd18b4c6d5663bcbb95698f726f3bef2b6bd4c

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
    Filesize

    14KB

    MD5

    9de341ca4dd62774ec3879337522e491

    SHA1

    682db3ba6f088d73351a8d6fd728632f1bbd4653

    SHA256

    43482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337

    SHA512

    8d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
    Filesize

    218KB

    MD5

    9e90b8196b1979b337be4c7c24111f7f

    SHA1

    0834f7c90373e59abdba656e8a73502c664e7534

    SHA256

    0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef

    SHA512

    b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db

  • memory/1064-109-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1064-101-0x00000000004021DA-mapping.dmp
  • memory/1120-89-0x0000000000175000-0x0000000000186000-memory.dmp
    Filesize

    68KB

  • memory/1120-72-0x0000000000000000-mapping.dmp
  • memory/1120-86-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1120-77-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1120-83-0x0000000000175000-0x0000000000186000-memory.dmp
    Filesize

    68KB

  • memory/1120-88-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1272-87-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1272-85-0x0000000000C26000-0x0000000000C37000-memory.dmp
    Filesize

    68KB

  • memory/1272-84-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1272-80-0x0000000000000000-mapping.dmp
  • memory/1368-56-0x0000000001E66000-0x0000000001E77000-memory.dmp
    Filesize

    68KB

  • memory/1368-54-0x0000000074E41000-0x0000000074E43000-memory.dmp
    Filesize

    8KB

  • memory/1368-57-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1368-55-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1644-63-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-59-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-61-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-69-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-58-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-76-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-65-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-66-0x00000000004021DA-mapping.dmp
  • memory/1944-90-0x0000000000000000-mapping.dmp
  • memory/1944-107-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB

  • memory/1944-108-0x0000000000A65000-0x0000000000A76000-memory.dmp
    Filesize

    68KB

  • memory/1944-110-0x0000000074160000-0x000000007470B000-memory.dmp
    Filesize

    5.7MB