Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 03:40

General

  • Target

    6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe

  • Size

    136KB

  • MD5

    2505742ae27ef7ae5d8a86b4933d39f8

  • SHA1

    adee8a16bbbc686c5809ca62701b70abf58381c6

  • SHA256

    6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7

  • SHA512

    dd986772ecf56c3b6017f95207d851ee265196b2e00ea39e7c5a8a91fce9800ba5900ebad73ef3b54b2f5c02099e126ca8386b3499cd747c77e1ac7189cf7902

  • SSDEEP

    3072:nCXSB4NcMTwxerG44kSFfOaRW4J3ELpLgE:nHBLdwAkSRv

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
      "C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
        "C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"
        3⤵
        • Executes dropped EXE
        PID:572

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • \Users\Admin\AppData\Roaming\picture\jhghf.exe
    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • \Users\Admin\AppData\Roaming\picture\jhghf.exe
    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • memory/572-69-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/572-66-0x0000000000000000-mapping.dmp
  • memory/572-71-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/572-72-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1128-56-0x0000000076961000-0x0000000076963000-memory.dmp
    Filesize

    8KB

  • memory/1128-61-0x0000000000430000-0x0000000000436000-memory.dmp
    Filesize

    24KB

  • memory/2004-68-0x0000000000340000-0x0000000000346000-memory.dmp
    Filesize

    24KB

  • memory/2004-59-0x0000000000000000-mapping.dmp