Analysis

  • max time kernel
    159s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 16:33

General

  • Target

    169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b.exe

  • Size

    344KB

  • MD5

    9f58ab1ff6fffcd9ebc688400caebb43

  • SHA1

    4d13349bc26eeeda8dd10df5c69afbf5c415776d

  • SHA256

    169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b

  • SHA512

    cce5e3156b8164bbd1ae5f35759f6e3aeb3766a7dcde8b026a0b8ed8140f1ffd777444d2942f856d5d255b7298671c575e6135633eaba37a698b39063f0d242c

  • SSDEEP

    3072:2c0acFibrRuC1OdlyKm9LDKElxLwYnMc1BVrox006FGchraTfvTdr9gpu7GCpuT8:2JlX8LD3scjnkGObTdJoC0l

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b.exe
    "C:\Users\Admin\AppData\Local\Temp\169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Drops file in System32 directory
      PID:2968
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hkmsvc.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hkmsvc.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
            PID:3116
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1036

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\AppMgmt.exe.log
      Filesize

      404B

      MD5

      15b6596d028baa2a113143d1828bcc36

      SHA1

      f1be43126c4e765fe499718c388823d44bf1fef1

      SHA256

      529f9fde2234067382b4c6fb8e5aee49d8a8b1b85c82b0bdae425fa2a0264f75

      SHA512

      f2a6cb8498f596c7bf9178ea32a245dbb3657f43a179f378ce952ce5cb8580810cd67ef1efb623bcf6cd796d74e2c9b7bc42cb8665ead397546ce3b400181e83

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
      Filesize

      11KB

      MD5

      767893283ac1bfe94e5a90eb058af81e

      SHA1

      84e06d1f09172a3e9e880843d4aaad9b3fb1fb9f

      SHA256

      a09c1d674cbe2b7383b9bf3a17b0ef9ea251e2f4dc8343cf8df78930b624f8f7

      SHA512

      a9be0214498ffc890d8272de8cf73d3d9b35eeb530dc5e9b34e4da62c3c1027a013c4a8512587e4e9c36f83b00eef7068a387bd748d7bf2c40ce8dc2aa89ac95

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
      Filesize

      11KB

      MD5

      767893283ac1bfe94e5a90eb058af81e

      SHA1

      84e06d1f09172a3e9e880843d4aaad9b3fb1fb9f

      SHA256

      a09c1d674cbe2b7383b9bf3a17b0ef9ea251e2f4dc8343cf8df78930b624f8f7

      SHA512

      a9be0214498ffc890d8272de8cf73d3d9b35eeb530dc5e9b34e4da62c3c1027a013c4a8512587e4e9c36f83b00eef7068a387bd748d7bf2c40ce8dc2aa89ac95

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
      Filesize

      11KB

      MD5

      767893283ac1bfe94e5a90eb058af81e

      SHA1

      84e06d1f09172a3e9e880843d4aaad9b3fb1fb9f

      SHA256

      a09c1d674cbe2b7383b9bf3a17b0ef9ea251e2f4dc8343cf8df78930b624f8f7

      SHA512

      a9be0214498ffc890d8272de8cf73d3d9b35eeb530dc5e9b34e4da62c3c1027a013c4a8512587e4e9c36f83b00eef7068a387bd748d7bf2c40ce8dc2aa89ac95

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgmt.exe
      Filesize

      11KB

      MD5

      767893283ac1bfe94e5a90eb058af81e

      SHA1

      84e06d1f09172a3e9e880843d4aaad9b3fb1fb9f

      SHA256

      a09c1d674cbe2b7383b9bf3a17b0ef9ea251e2f4dc8343cf8df78930b624f8f7

      SHA512

      a9be0214498ffc890d8272de8cf73d3d9b35eeb530dc5e9b34e4da62c3c1027a013c4a8512587e4e9c36f83b00eef7068a387bd748d7bf2c40ce8dc2aa89ac95

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hkmsvc.exe
      Filesize

      344KB

      MD5

      9f58ab1ff6fffcd9ebc688400caebb43

      SHA1

      4d13349bc26eeeda8dd10df5c69afbf5c415776d

      SHA256

      169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b

      SHA512

      cce5e3156b8164bbd1ae5f35759f6e3aeb3766a7dcde8b026a0b8ed8140f1ffd777444d2942f856d5d255b7298671c575e6135633eaba37a698b39063f0d242c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hkmsvc.exe
      Filesize

      344KB

      MD5

      9f58ab1ff6fffcd9ebc688400caebb43

      SHA1

      4d13349bc26eeeda8dd10df5c69afbf5c415776d

      SHA256

      169fd2b24a57fe74de02ef91c26b1d5e1ef5a55b507ba1c196cce5f957ed243b

      SHA512

      cce5e3156b8164bbd1ae5f35759f6e3aeb3766a7dcde8b026a0b8ed8140f1ffd777444d2942f856d5d255b7298671c575e6135633eaba37a698b39063f0d242c

    • memory/1036-153-0x0000000000000000-mapping.dmp
    • memory/1036-160-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/1036-157-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-148-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-142-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-139-0x0000000000000000-mapping.dmp
    • memory/2968-134-0x0000000000000000-mapping.dmp
    • memory/2968-135-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2968-137-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2968-158-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2968-138-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/3116-150-0x0000000000000000-mapping.dmp
    • memory/4184-149-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/4184-132-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/4184-133-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/4576-147-0x000000000154B000-0x000000000154F000-memory.dmp
      Filesize

      16KB

    • memory/4576-146-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB

    • memory/4576-144-0x0000000000000000-mapping.dmp
    • memory/4576-159-0x00000000752B0000-0x0000000075861000-memory.dmp
      Filesize

      5.7MB