Analysis
-
max time kernel
150s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe
Resource
win7-20220812-en
General
-
Target
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe
-
Size
1.9MB
-
MD5
b2edfeaa3ac26d6025aac0b92788ed11
-
SHA1
4d6a5d91254ef3de3da4db6a399beb1fc2ede177
-
SHA256
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
-
SHA512
3528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
SSDEEP
12288:X0LQ8daG/UYCCsUF4oYckcQRQo1wwVigOK8USPmnZ385EuL/C6shsyE6kGMgPYzz:XIKuL/CYzOmcJs28PpnuIIdw
Malware Config
Extracted
netwire
alex419.duckdns.org:60622
178.239.21.185:60622
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
GRACE101
-
install_path
%AppData%\Install\file.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
NwgwuGDR
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Abobex
-
use_mutex
true
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire \Users\Admin\AppData\Roaming\Install\file.exe netwire \Users\Admin\AppData\Roaming\Install\file.exe netwire C:\Users\Admin\AppData\Roaming\Install\file.exe netwire -
Executes dropped EXE 4 IoCs
Processes:
Host.exefileremitz.exefile.exefileremitz.exepid process 1328 Host.exe 1248 fileremitz.exe 1932 file.exe 1640 fileremitz.exe -
Loads dropped DLL 6 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exeHost.exepid process 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 1328 Host.exe 1328 Host.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
file.exeWScript.exefileremitz.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Abobex = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\file.exe" file.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fileremitz = "C:\\Users\\Admin\\subfolder\\fileremitz.vbs -VC" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Service = "C:\\Program Files (x86)\\SCSI Service\\scsisvc.exe" fileremitz.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ file.exe -
Processes:
fileremitz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fileremitz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fileremitz.exedescription pid process target process PID 1248 set thread context of 1640 1248 fileremitz.exe fileremitz.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fileremitz.exedescription ioc process File opened for modification C:\Program Files (x86)\SCSI Service\scsisvc.exe fileremitz.exe File created C:\Program Files (x86)\SCSI Service\scsisvc.exe fileremitz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fileremitz.exepid process 1640 fileremitz.exe 1640 fileremitz.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fileremitz.exepid process 1640 fileremitz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fileremitz.exedescription pid process Token: SeDebugPrivilege 1640 fileremitz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exefileremitz.exepid process 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 1248 fileremitz.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
fileremitz.exepid process 1640 fileremitz.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exeHost.exefileremitz.exedescription pid process target process PID 1752 wrote to memory of 1328 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 1752 wrote to memory of 1328 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 1752 wrote to memory of 1328 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 1752 wrote to memory of 1328 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 1752 wrote to memory of 1404 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 1752 wrote to memory of 1404 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 1752 wrote to memory of 1404 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 1752 wrote to memory of 1404 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 1752 wrote to memory of 1248 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 1752 wrote to memory of 1248 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 1752 wrote to memory of 1248 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 1752 wrote to memory of 1248 1752 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 1328 wrote to memory of 1932 1328 Host.exe file.exe PID 1328 wrote to memory of 1932 1328 Host.exe file.exe PID 1328 wrote to memory of 1932 1328 Host.exe file.exe PID 1328 wrote to memory of 1932 1328 Host.exe file.exe PID 1248 wrote to memory of 1640 1248 fileremitz.exe fileremitz.exe PID 1248 wrote to memory of 1640 1248 fileremitz.exe fileremitz.exe PID 1248 wrote to memory of 1640 1248 fileremitz.exe fileremitz.exe PID 1248 wrote to memory of 1640 1248 fileremitz.exe fileremitz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe"C:\Users\Admin\AppData\Local\Temp\39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\file.exe"C:\Users\Admin\AppData\Roaming\Install\file.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\subfolder\fileremitz.vbs"2⤵
- Adds Run key to start application
-
C:\Users\Admin\subfolder\fileremitz.exe"C:\Users\Admin\subfolder\fileremitz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\subfolder\fileremitz.exeC:\Users\Admin\subfolder\fileremitz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\AppData\Roaming\Install\file.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.vbsFilesize
1024B
MD584ac02433ae365d34512ee0013da1f93
SHA15bbe796a76a1063e8b857457ebfda5ea41222c29
SHA256a8c6a45b6dc4a8cdd5ae5ed775335c1c7a50cf2fe2f312c1f2d19e9d5c5107c7
SHA512028c15b847bd30239fb84714c165c430b51a94107ec73951eeac53df8bfef8590f51d62093ecafac47047dd078a18eb98a95ee8ea205a5d9e8625fde26c70ccd
-
\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
\Users\Admin\AppData\Roaming\Install\file.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
\Users\Admin\AppData\Roaming\Install\file.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
memory/1248-86-0x0000000077280000-0x0000000077429000-memory.dmpFilesize
1.7MB
-
memory/1248-67-0x0000000000000000-mapping.dmp
-
memory/1248-87-0x0000000077460000-0x00000000775E0000-memory.dmpFilesize
1.5MB
-
memory/1328-60-0x0000000000000000-mapping.dmp
-
memory/1404-64-0x0000000000000000-mapping.dmp
-
memory/1640-90-0x0000000000400000-0x00000000005DD000-memory.dmpFilesize
1.9MB
-
memory/1640-91-0x0000000077280000-0x0000000077429000-memory.dmpFilesize
1.7MB
-
memory/1640-95-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB
-
memory/1640-94-0x0000000000220000-0x0000000000227000-memory.dmpFilesize
28KB
-
memory/1640-84-0x00000000004BC3AC-mapping.dmp
-
memory/1640-93-0x0000000074240000-0x00000000747EB000-memory.dmpFilesize
5.7MB
-
memory/1640-92-0x0000000008C60000-0x00000000093FC000-memory.dmpFilesize
7.6MB
-
memory/1640-89-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1752-72-0x0000000077460000-0x00000000775E0000-memory.dmpFilesize
1.5MB
-
memory/1752-68-0x0000000000240000-0x0000000000247000-memory.dmpFilesize
28KB
-
memory/1752-63-0x0000000077460000-0x00000000775E0000-memory.dmpFilesize
1.5MB
-
memory/1752-56-0x0000000000240000-0x0000000000247000-memory.dmpFilesize
28KB
-
memory/1752-57-0x0000000076091000-0x0000000076093000-memory.dmpFilesize
8KB
-
memory/1752-62-0x0000000077280000-0x0000000077429000-memory.dmpFilesize
1.7MB
-
memory/1932-78-0x0000000000000000-mapping.dmp