Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
-
Size
488KB
-
MD5
bc69fb3ff46a3d9e44e99236236fbf8c
-
SHA1
9dc9dbb9e6335672dc786712c2e2a107f6e8bca1
-
SHA256
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066
-
SHA512
4e95d9704e1dead38c8ad554d9559641cdb56ee47a5af5523e62c18e714bdecb93f599b518137bb541fa140823f594ed5d1b1c990c855ab4ed1537782063ff7e
-
SSDEEP
6144:hO+FK0C0bMEQ04oMER0u+GIIIIIIIhIIIIIIIIIIIIIIIUB:hOePAEhDm5B
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1852-133-0x0000000000400000-0x0000000000421000-memory.dmp netwire behavioral2/memory/1852-134-0x00000000001F0000-0x00000000001FA000-memory.dmp netwire behavioral2/memory/1852-135-0x0000000000400000-0x0000000000480000-memory.dmp netwire behavioral2/memory/1852-137-0x0000000000400000-0x0000000000480000-memory.dmp netwire behavioral2/memory/1852-138-0x0000000000400000-0x0000000000480000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8GCI48A5-MFH8-T56L-KG6D-800WQ18UPJAI} 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8GCI48A5-MFH8-T56L-KG6D-800WQ18UPJAI}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe\"" 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe -
Processes:
resource yara_rule behavioral2/memory/1852-133-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1852-135-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/1852-137-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/1852-138-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Local\\Temp\\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe" 50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe"C:\Users\Admin\AppData\Local\Temp\50067123a00b1ed69c8b4d819732b4a6d6e0bb9acbbf3f27d7cb67c07cba5066.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1852-132-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1852-133-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1852-134-0x00000000001F0000-0x00000000001FA000-memory.dmpFilesize
40KB
-
memory/1852-135-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1852-136-0x00000000001F0000-0x00000000001FA000-memory.dmpFilesize
40KB
-
memory/1852-137-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1852-138-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB