Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 01:09
Static task
static1
Behavioral task
behavioral1
Sample
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe
Resource
win10v2004-20220812-en
General
-
Target
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe
-
Size
128KB
-
MD5
66f07d8c367c635e5f6f7583436cd970
-
SHA1
a6ae5111804cd4cc98f81f23122fdd7deca32c44
-
SHA256
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795
-
SHA512
daa7bdcff96d39042ba09fcbd6ba3b12a4fc0442a12906d48d742e22289f83b980e27a1ed7c5461bd37894e993a44548f5d2c59797ac330d052b617474895bde
-
SSDEEP
3072:uFr85oUnFtac6koMxv6guvss+PojUyxkjy4B:ir8aafa9BMxyg8J+AjDD4
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4124-134-0x0000000000000000-mapping.dmp netwire behavioral2/memory/4124-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4124-138-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4124-141-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1084-145-0x0000000000000000-mapping.dmp netwire behavioral2/memory/1084-150-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 4184 Host.exe 1084 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exeHost.exedescription pid process target process PID 2204 set thread context of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 4184 set thread context of 1084 4184 Host.exe Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exeHost.exepid process 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 4184 Host.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exeHost.exedescription pid process target process PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 2204 wrote to memory of 4124 2204 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe PID 4124 wrote to memory of 4184 4124 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe Host.exe PID 4124 wrote to memory of 4184 4124 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe Host.exe PID 4124 wrote to memory of 4184 4124 1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe PID 4184 wrote to memory of 1084 4184 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe"C:\Users\Admin\AppData\Local\Temp\1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe"C:\Users\Admin\AppData\Local\Temp\1186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
128KB
MD566f07d8c367c635e5f6f7583436cd970
SHA1a6ae5111804cd4cc98f81f23122fdd7deca32c44
SHA2561186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795
SHA512daa7bdcff96d39042ba09fcbd6ba3b12a4fc0442a12906d48d742e22289f83b980e27a1ed7c5461bd37894e993a44548f5d2c59797ac330d052b617474895bde
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
128KB
MD566f07d8c367c635e5f6f7583436cd970
SHA1a6ae5111804cd4cc98f81f23122fdd7deca32c44
SHA2561186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795
SHA512daa7bdcff96d39042ba09fcbd6ba3b12a4fc0442a12906d48d742e22289f83b980e27a1ed7c5461bd37894e993a44548f5d2c59797ac330d052b617474895bde
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
128KB
MD566f07d8c367c635e5f6f7583436cd970
SHA1a6ae5111804cd4cc98f81f23122fdd7deca32c44
SHA2561186674c00552b361cc1f4b2c3d7fae6c23ba68e6a80a3f3b4dbe49cddfd2795
SHA512daa7bdcff96d39042ba09fcbd6ba3b12a4fc0442a12906d48d742e22289f83b980e27a1ed7c5461bd37894e993a44548f5d2c59797ac330d052b617474895bde
-
memory/1084-145-0x0000000000000000-mapping.dmp
-
memory/1084-150-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2204-136-0x0000000000570000-0x0000000000576000-memory.dmpFilesize
24KB
-
memory/4124-134-0x0000000000000000-mapping.dmp
-
memory/4124-135-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4124-138-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4124-141-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4184-139-0x0000000000000000-mapping.dmp