Analysis
-
max time kernel
178s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 02:41
Static task
static1
Behavioral task
behavioral1
Sample
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe
Resource
win7-20221111-en
General
-
Target
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe
-
Size
124KB
-
MD5
fa9e61f2139112fe8ed6dbcd4e49d462
-
SHA1
a524b57b42bbb0962e66197b37ffbda6bc44c985
-
SHA256
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b
-
SHA512
c8a6af6178f3dc02e23d3c6b8084060e8a3556e3064c893210d5e2e9af7dcc42fd6b15b388710a27fb31ac604f99122b03898f83970ab15483f3bd05782704b1
-
SSDEEP
3072:NdkI7wp1d9HHuyiVB9N45y7W88V7ZWjN0+qLIDJ:NSphnub9N45XcBzqsD
Malware Config
Signatures
-
NetWire RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-61-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1620-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1620-64-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1620-67-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1620-71-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1300-84-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1300-90-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1300-91-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1120 Host.exe 1300 Host.exe -
Loads dropped DLL 1 IoCs
Processes:
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exepid process 1620 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exeHost.exedescription pid process target process PID 940 set thread context of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 1120 set thread context of 1300 1120 Host.exe Host.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exeHost.exedescription pid process target process PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 940 wrote to memory of 1620 940 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe PID 1620 wrote to memory of 1120 1620 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe Host.exe PID 1620 wrote to memory of 1120 1620 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe Host.exe PID 1620 wrote to memory of 1120 1620 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe Host.exe PID 1620 wrote to memory of 1120 1620 0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe PID 1120 wrote to memory of 1300 1120 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe"C:\Users\Admin\AppData\Local\Temp\0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe"C:\Users\Admin\AppData\Local\Temp\0280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
124KB
MD5fa9e61f2139112fe8ed6dbcd4e49d462
SHA1a524b57b42bbb0962e66197b37ffbda6bc44c985
SHA2560280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b
SHA512c8a6af6178f3dc02e23d3c6b8084060e8a3556e3064c893210d5e2e9af7dcc42fd6b15b388710a27fb31ac604f99122b03898f83970ab15483f3bd05782704b1
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
124KB
MD5fa9e61f2139112fe8ed6dbcd4e49d462
SHA1a524b57b42bbb0962e66197b37ffbda6bc44c985
SHA2560280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b
SHA512c8a6af6178f3dc02e23d3c6b8084060e8a3556e3064c893210d5e2e9af7dcc42fd6b15b388710a27fb31ac604f99122b03898f83970ab15483f3bd05782704b1
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
124KB
MD5fa9e61f2139112fe8ed6dbcd4e49d462
SHA1a524b57b42bbb0962e66197b37ffbda6bc44c985
SHA2560280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b
SHA512c8a6af6178f3dc02e23d3c6b8084060e8a3556e3064c893210d5e2e9af7dcc42fd6b15b388710a27fb31ac604f99122b03898f83970ab15483f3bd05782704b1
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
124KB
MD5fa9e61f2139112fe8ed6dbcd4e49d462
SHA1a524b57b42bbb0962e66197b37ffbda6bc44c985
SHA2560280d01acef062c20eb217b98c954617a08e819e480a64305e0b44585b17178b
SHA512c8a6af6178f3dc02e23d3c6b8084060e8a3556e3064c893210d5e2e9af7dcc42fd6b15b388710a27fb31ac604f99122b03898f83970ab15483f3bd05782704b1
-
memory/940-68-0x0000000074230000-0x00000000747DB000-memory.dmpFilesize
5.7MB
-
memory/940-55-0x0000000074230000-0x00000000747DB000-memory.dmpFilesize
5.7MB
-
memory/940-54-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1120-75-0x0000000073C80000-0x000000007422B000-memory.dmpFilesize
5.7MB
-
memory/1120-70-0x0000000000000000-mapping.dmp
-
memory/1120-88-0x0000000073C80000-0x000000007422B000-memory.dmpFilesize
5.7MB
-
memory/1300-84-0x00000000004021DA-mapping.dmp
-
memory/1300-91-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1300-90-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-71-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-67-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-57-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-56-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-61-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-63-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1620-64-0x00000000004021DA-mapping.dmp