Analysis
-
max time kernel
192s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe
Resource
win10v2004-20221111-en
General
-
Target
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe
-
Size
192KB
-
MD5
7c417ad243871bc6419878e3063875b6
-
SHA1
0c86d8dc5e638a39b654acc72747dc182a20caec
-
SHA256
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe
-
SHA512
8604f69e7da7dbedcf706192661431c194d80decaf28284ca9014a6fb072d6af405579d82f769f2058e3cd1c3f5d09684101a78b798d2161af7e638b706b1a59
-
SSDEEP
3072:0QaHPTRd51hQzvDsrh9aQnyT5zZhR+QmJm26LZg/ljDc8XSjbOrObfP:+PT351qT4r/aQnyiJn66/tqX
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2636-135-0x0000000000000000-mapping.dmp netwire behavioral2/memory/2636-137-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2636-138-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2636-139-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4836-145-0x0000000000000000-mapping.dmp netwire behavioral2/memory/4836-149-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1132 Host.exe 4836 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exeHost.exepid process 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe 1132 Host.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exeb0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exeHost.exedescription pid process target process PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 1304 wrote to memory of 2636 1304 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe PID 2636 wrote to memory of 1132 2636 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe Host.exe PID 2636 wrote to memory of 1132 2636 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe Host.exe PID 2636 wrote to memory of 1132 2636 b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe PID 1132 wrote to memory of 4836 1132 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe"C:\Users\Admin\AppData\Local\Temp\b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe"C:\Users\Admin\AppData\Local\Temp\b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
192KB
MD57c417ad243871bc6419878e3063875b6
SHA10c86d8dc5e638a39b654acc72747dc182a20caec
SHA256b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe
SHA5128604f69e7da7dbedcf706192661431c194d80decaf28284ca9014a6fb072d6af405579d82f769f2058e3cd1c3f5d09684101a78b798d2161af7e638b706b1a59
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
192KB
MD57c417ad243871bc6419878e3063875b6
SHA10c86d8dc5e638a39b654acc72747dc182a20caec
SHA256b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe
SHA5128604f69e7da7dbedcf706192661431c194d80decaf28284ca9014a6fb072d6af405579d82f769f2058e3cd1c3f5d09684101a78b798d2161af7e638b706b1a59
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
192KB
MD57c417ad243871bc6419878e3063875b6
SHA10c86d8dc5e638a39b654acc72747dc182a20caec
SHA256b0b885d27dfdb7d0f695985db06553a7ce2db2a967fe7092d75675a08049befe
SHA5128604f69e7da7dbedcf706192661431c194d80decaf28284ca9014a6fb072d6af405579d82f769f2058e3cd1c3f5d09684101a78b798d2161af7e638b706b1a59
-
memory/1132-140-0x0000000000000000-mapping.dmp
-
memory/1304-134-0x0000000002C10000-0x0000000002C16000-memory.dmpFilesize
24KB
-
memory/1304-136-0x0000000002C10000-0x0000000002C16000-memory.dmpFilesize
24KB
-
memory/2636-135-0x0000000000000000-mapping.dmp
-
memory/2636-137-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2636-138-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2636-139-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4836-145-0x0000000000000000-mapping.dmp
-
memory/4836-149-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB