Analysis

  • max time kernel
    241s
  • max time network
    249s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 03:40

General

  • Target

    6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe

  • Size

    136KB

  • MD5

    2505742ae27ef7ae5d8a86b4933d39f8

  • SHA1

    adee8a16bbbc686c5809ca62701b70abf58381c6

  • SHA256

    6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7

  • SHA512

    dd986772ecf56c3b6017f95207d851ee265196b2e00ea39e7c5a8a91fce9800ba5900ebad73ef3b54b2f5c02099e126ca8386b3499cd747c77e1ac7189cf7902

  • SSDEEP

    3072:nCXSB4NcMTwxerG44kSFfOaRW4J3ELpLgE:nHBLdwAkSRv

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
      "C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe
        "C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"
        3⤵
        • Executes dropped EXE
        PID:2300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe

    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe

    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • C:\Users\Admin\AppData\Roaming\picture\jhghf.exe

    Filesize

    136KB

    MD5

    9a9b453461910f1832405928613740c7

    SHA1

    55f7155d2c34c0e2e87922748ed0bd0047a47016

    SHA256

    bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1

    SHA512

    c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194

  • memory/2212-135-0x0000000000000000-mapping.dmp

  • memory/2212-142-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/2300-140-0x0000000000000000-mapping.dmp

  • memory/2300-143-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2300-144-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2300-145-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4832-134-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB