Analysis
-
max time kernel
267s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
-
Size
488KB
-
MD5
bc69fb3ff46a3d9e44e99236236fbf8c
-
SHA1
9dc9dbb9e6335672dc786712c2e2a107f6e8bca1
-
SHA256
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066
-
SHA512
4e95d9704e1dead38c8ad554d9559641cdb56ee47a5af5523e62c18e714bdecb93f599b518137bb541fa140823f594ed5d1b1c990c855ab4ed1537782063ff7e
-
SSDEEP
6144:hO+FK0C0bMEQ04oMER0u+GIIIIIIIhIIIIIIIIIIIIIIIUB:hOePAEhDm5B
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/472-56-0x0000000000400000-0x0000000000421000-memory.dmp netwire behavioral1/memory/472-58-0x0000000000400000-0x0000000000480000-memory.dmp netwire behavioral1/memory/472-59-0x0000000000230000-0x000000000023A000-memory.dmp netwire behavioral1/memory/472-60-0x0000000000400000-0x0000000000480000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8GCI48A5-MFH8-T56L-KG6D-800WQ18UPJAI} 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8GCI48A5-MFH8-T56L-KG6D-800WQ18UPJAI}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe\"" 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe -
Processes:
resource yara_rule behavioral1/memory/472-56-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/472-57-0x0000000000230000-0x000000000023A000-memory.dmp upx behavioral1/memory/472-58-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/472-60-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Local\\Temp\\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe" 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exepid process 472 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe"C:\Users\Admin\AppData\Local\Temp\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-54-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/472-55-0x00000000767C1000-0x00000000767C3000-memory.dmpFilesize
8KB
-
memory/472-56-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/472-57-0x0000000000230000-0x000000000023A000-memory.dmpFilesize
40KB
-
memory/472-58-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/472-59-0x0000000000230000-0x000000000023A000-memory.dmpFilesize
40KB
-
memory/472-60-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB