Analysis
-
max time kernel
145s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 17:29
Static task
static1
Behavioral task
behavioral1
Sample
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe
Resource
win10v2004-20221111-en
General
-
Target
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe
-
Size
160KB
-
MD5
353e2f067d91a418c1e33a0c6fc438ab
-
SHA1
1fafad6f29fe51416f05f2644742d10ebfae86e2
-
SHA256
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d
-
SHA512
4895ac68a8bbdb699b11f5bfa771a65d651d36e1b03813af0747660187fd10964bd44df5db0a663f344270b20c9c046525222f80195c99b79f591da2058ed337
-
SSDEEP
3072:HQl1XQB8Dl2v90PgQLVBpPXGVc8R3dB88BoyRs9oFTecls6QmSTq2JpEu:w1XQB8xVXGVc87tZMcls6QmS9k
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1420-61-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1420-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1420-64-0x0000000000402196-mapping.dmp netwire behavioral1/memory/1420-67-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1420-68-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Suspicious use of SetThreadContext 2 IoCs
Processes:
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exedescription pid process target process PID 1980 set thread context of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 set thread context of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe -
Drops file in Windows directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegSvcs.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exedescription pid process target process PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1420 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe PID 1980 wrote to memory of 1888 1980 baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe"C:\Users\Admin\AppData\Local\Temp\baf168f95f37380c22bc1e385e73fdae7ac384381a0586084dbf94d8f639063d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /WSILlzCwX /C:\Users\Admin\AppData\Roaming\WSILlzCwX\WSILlzCwX.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-67-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-68-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-61-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-57-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-56-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-63-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1420-64-0x0000000000402196-mapping.dmp
-
memory/1888-75-0x00000000004026FA-mapping.dmp
-
memory/1888-70-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-71-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-72-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-74-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-77-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-79-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1888-81-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1888-82-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1980-55-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1980-69-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB
-
memory/1980-54-0x0000000076031000-0x0000000076033000-memory.dmpFilesize
8KB
-
memory/1980-83-0x0000000074360000-0x000000007490B000-memory.dmpFilesize
5.7MB