Analysis
-
max time kernel
302s -
max time network
374s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe
Resource
win7-20220812-en
General
-
Target
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe
-
Size
1.9MB
-
MD5
b2edfeaa3ac26d6025aac0b92788ed11
-
SHA1
4d6a5d91254ef3de3da4db6a399beb1fc2ede177
-
SHA256
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
-
SHA512
3528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
SSDEEP
12288:X0LQ8daG/UYCCsUF4oYckcQRQo1wwVigOK8USPmnZ385EuL/C6shsyE6kGMgPYzz:XIKuL/CYzOmcJs28PpnuIIdw
Malware Config
Extracted
netwire
alex419.duckdns.org:60622
178.239.21.185:60622
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
GRACE101
-
install_path
%AppData%\Install\file.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
NwgwuGDR
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Abobex
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Roaming\Install\file.exe netwire C:\Users\Admin\AppData\Roaming\Install\file.exe netwire -
Executes dropped EXE 4 IoCs
Processes:
Host.exefileremitz.exefile.exefileremitz.exepid process 3216 Host.exe 2284 fileremitz.exe 3972 file.exe 5012 fileremitz.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Host.exe39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
file.exeWScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ file.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Abobex = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\file.exe" file.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fileremitz = "C:\\Users\\Admin\\subfolder\\fileremitz.vbs -VC" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fileremitz.exedescription pid process target process PID 2284 set thread context of 5012 2284 fileremitz.exe fileremitz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exefileremitz.exepid process 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe 2284 fileremitz.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exeHost.exefileremitz.exedescription pid process target process PID 4884 wrote to memory of 3216 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 4884 wrote to memory of 3216 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 4884 wrote to memory of 3216 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe Host.exe PID 4884 wrote to memory of 4900 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 4884 wrote to memory of 4900 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 4884 wrote to memory of 4900 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe WScript.exe PID 4884 wrote to memory of 2284 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 4884 wrote to memory of 2284 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 4884 wrote to memory of 2284 4884 39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe fileremitz.exe PID 3216 wrote to memory of 3972 3216 Host.exe file.exe PID 3216 wrote to memory of 3972 3216 Host.exe file.exe PID 3216 wrote to memory of 3972 3216 Host.exe file.exe PID 2284 wrote to memory of 5012 2284 fileremitz.exe fileremitz.exe PID 2284 wrote to memory of 5012 2284 fileremitz.exe fileremitz.exe PID 2284 wrote to memory of 5012 2284 fileremitz.exe fileremitz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe"C:\Users\Admin\AppData\Local\Temp\39f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\file.exe"C:\Users\Admin\AppData\Roaming\Install\file.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\subfolder\fileremitz.vbs"2⤵
- Adds Run key to start application
-
C:\Users\Admin\subfolder\fileremitz.exe"C:\Users\Admin\subfolder\fileremitz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\subfolder\fileremitz.exeC:\Users\Admin\subfolder\fileremitz.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\AppData\Local\Temp\Host.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\AppData\Roaming\Install\file.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\AppData\Roaming\Install\file.exeFilesize
148KB
MD5b50aeef02f35381208f2bdc7536fecb6
SHA173197a36a09b21901da085e67c600b5e84606668
SHA2568f168eecbe8608addbffe143cdcccc4be9ec45a5caf52fa00528a2b14ebe0a47
SHA512275121d6114a8d22500ddd8ed722ea553084e4b289614484e932af076d52f375f3810191c937dd38f36889788bb07ac4fb4c7c140dd8adeb4cfdafc874c7bff9
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.exeFilesize
1.9MB
MD5b2edfeaa3ac26d6025aac0b92788ed11
SHA14d6a5d91254ef3de3da4db6a399beb1fc2ede177
SHA25639f4239391959ef5526d88982850bfd96cff70800fdab102aa1472c0b279f0af
SHA5123528aebd1354a02fdd915be0e4d4b5c146114bc90763744ff8bf090ead15d5bb0a5c7bd94ff4c18b5acb669ee7ffbef3888e596c0e677ab8baf549af0c718234
-
C:\Users\Admin\subfolder\fileremitz.vbsFilesize
1024B
MD584ac02433ae365d34512ee0013da1f93
SHA15bbe796a76a1063e8b857457ebfda5ea41222c29
SHA256a8c6a45b6dc4a8cdd5ae5ed775335c1c7a50cf2fe2f312c1f2d19e9d5c5107c7
SHA512028c15b847bd30239fb84714c165c430b51a94107ec73951eeac53df8bfef8590f51d62093ecafac47047dd078a18eb98a95ee8ea205a5d9e8625fde26c70ccd
-
memory/2284-158-0x0000000076E70000-0x0000000077013000-memory.dmpFilesize
1.6MB
-
memory/2284-154-0x0000000076E70000-0x0000000077013000-memory.dmpFilesize
1.6MB
-
memory/2284-153-0x00007FF8294B0000-0x00007FF8296A5000-memory.dmpFilesize
2.0MB
-
memory/2284-141-0x0000000000000000-mapping.dmp
-
memory/2284-155-0x0000000002160000-0x0000000002167000-memory.dmpFilesize
28KB
-
memory/3216-137-0x0000000000000000-mapping.dmp
-
memory/3972-150-0x0000000000000000-mapping.dmp
-
memory/4884-134-0x0000000002490000-0x0000000002497000-memory.dmpFilesize
28KB
-
memory/4884-135-0x00007FF8294B0000-0x00007FF8296A5000-memory.dmpFilesize
2.0MB
-
memory/4884-136-0x0000000076E70000-0x0000000077013000-memory.dmpFilesize
1.6MB
-
memory/4884-148-0x0000000076E70000-0x0000000077013000-memory.dmpFilesize
1.6MB
-
memory/4884-146-0x00007FF8294B0000-0x00007FF8296A5000-memory.dmpFilesize
2.0MB
-
memory/4884-143-0x0000000002490000-0x0000000002497000-memory.dmpFilesize
28KB
-
memory/4900-140-0x0000000000000000-mapping.dmp
-
memory/5012-163-0x0000000000400000-0x00000000005DD000-memory.dmpFilesize
1.9MB
-
memory/5012-161-0x0000000000940000-0x0000000000947000-memory.dmpFilesize
28KB
-
memory/5012-156-0x0000000000000000-mapping.dmp
-
memory/5012-159-0x00007FF8294B0000-0x00007FF8296A5000-memory.dmpFilesize
2.0MB
-
memory/5012-160-0x0000000076E70000-0x0000000077013000-memory.dmpFilesize
1.6MB
-
memory/5012-162-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB