Analysis

  • max time kernel
    155s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 13:35

General

  • Target

    34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe

  • Size

    161KB

  • MD5

    906a1737187cf53bd4e256659a83c981

  • SHA1

    ffec0160e8e895aa2497ef984377de8b07138501

  • SHA256

    34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a

  • SHA512

    f78350c96d3276336eec9ba97c05add31d799cd243082f562b7fbf50b24a6a376e6ac3694ae37c40ea8077301567622db2ed6efc8d324cae0f08bf099f97f38a

  • SSDEEP

    3072:qm6uSJNBB3ZVatxDG67LwjX4DTjeAQaRCG7mmhAEFua7:fnSJnBaxhQ47VRCG7YEFt

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe
    "C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe
      "C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe"
      2⤵
        PID:4792
      • C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe
        "C:\Users\Admin\AppData\Local\Temp\34ec65b4bafa3e6b28917c39fe20a3ff91acad98af629dbe3c9f27d9a239f69a.exe"
        2⤵
          PID:840

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/840-134-0x0000000000000000-mapping.dmp
      • memory/840-135-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/840-137-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/840-140-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/840-141-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/3440-132-0x0000000074E90000-0x0000000075441000-memory.dmp
        Filesize

        5.7MB

      • memory/3440-138-0x0000000074E90000-0x0000000075441000-memory.dmp
        Filesize

        5.7MB

      • memory/3440-139-0x0000000074E90000-0x0000000075441000-memory.dmp
        Filesize

        5.7MB

      • memory/4792-133-0x0000000000000000-mapping.dmp