Analysis
-
max time kernel
142s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe
Resource
win7-20221111-en
General
-
Target
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe
-
Size
257KB
-
MD5
d699e0316ff32d7b7d551ad6abface4c
-
SHA1
789f7e7ada8f769ac4709a74cf16c2a086f595e9
-
SHA256
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650
-
SHA512
e8d35c8acd950fcc3d81eb5a3b1047723d68b5de8906d825787ab87add3796abe700271fb666190732538e740b345c60a3a5fce8d0f79ac210abdcd536fc9fd1
-
SSDEEP
6144:5V6vBUSGrwSKVICKku8IF0j0KngiDyP5/x3:5VvSGrwSKqbF8IF08iuP/3
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
extensions14718sec.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YbcwLUQv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3492-144-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3492-146-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3492-147-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TVnkRn.url 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exedescription pid process target process PID 5100 set thread context of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exepid process 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exedescription pid process Token: SeDebugPrivilege 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.execsc.exedescription pid process target process PID 5100 wrote to memory of 2004 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe csc.exe PID 5100 wrote to memory of 2004 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe csc.exe PID 5100 wrote to memory of 2004 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe csc.exe PID 2004 wrote to memory of 3636 2004 csc.exe cvtres.exe PID 2004 wrote to memory of 3636 2004 csc.exe cvtres.exe PID 2004 wrote to memory of 3636 2004 csc.exe cvtres.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe PID 5100 wrote to memory of 3492 5100 7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe"C:\Users\Admin\AppData\Local\Temp\7d27252ef87acae8a2b583d920e52d8210ee69c4f9591ed20de1cfd55bf01650.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ojpti4pc\ojpti4pc.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71B5.tmp" "c:\Users\Admin\AppData\Local\Temp\ojpti4pc\CSC87C1B814D11428EB394E71CEC29EF4C.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES71B5.tmpFilesize
1KB
MD599f78925da1a1bee113c6abef99b0840
SHA13cde211b7425c28a8283cae7706f41d6856ab385
SHA2561306b24bbc1d0616e60f5d10a4c813f919762b476858e0c423e0a66632df6df7
SHA512fed02bdef7c95a22ac39b04f491ff7b8420c6de29177d911c300f5ba85deb5ac463c1400d263763551bcbec3c892f274a542c14b9cacce0b780b69706274a027
-
C:\Users\Admin\AppData\Local\Temp\ojpti4pc\ojpti4pc.dllFilesize
17KB
MD5868fcb1a06aed0549486c5e31e3959d5
SHA186ebd77c9fbe3dbc96d530f31c96efc20c13f949
SHA2561be8d4f874b44845647ab60150bedac56207b672154dfa993ec36d72fd0ab4a3
SHA512d9110826a8155e2bb7a16638184dc934ca6be68fd95ed7fcfa60588b61f54eb97a3ef1d1e7d57d4906e90a9baf2d86c4922f8195a2429606a89b3ff21a858161
-
C:\Users\Admin\AppData\Local\Temp\ojpti4pc\ojpti4pc.pdbFilesize
53KB
MD520b0e6137e986d7784804ad67e2ef32f
SHA1c94a10558116c2602ae092b690190397bd012d00
SHA25641a72971328dd39e72659d5c5f76ece9edc505b36193ea38ed3552aa0d8c7851
SHA5123391eafa338cdfea01d9662f8fcd80ba06bec8aa2c23a081595f807636e4ca4a6c01ff3cd83dec5c940fac9eb8da5ea62f9cd5efe1305f9afa68fc5a34d91506
-
\??\c:\Users\Admin\AppData\Local\Temp\ojpti4pc\CSC87C1B814D11428EB394E71CEC29EF4C.TMPFilesize
1KB
MD55259ae16529cf3514011ba814bd6c57a
SHA13156dba812d91f6af644fb212a2922aaf2ac441d
SHA2562bb0de440315157f10555f33ea1fbe933ced806b9679af0fa8da311a7ac04f51
SHA5128a541625950763579d95c13343b07fac898f6ba4d8c639cccc628b8277bcae0b4e78a1f602db26c6a925bdc626b5dd1ccb60dc158d2066dce7cdcf3f1d827813
-
\??\c:\Users\Admin\AppData\Local\Temp\ojpti4pc\ojpti4pc.0.csFilesize
37KB
MD59fafd44315a524486b84e23bedaec8bf
SHA10d2820c6a0d71d57200dccafa2c6fb421269f2ec
SHA256549faa466584fa74103c11227ef0b811cf96bda2d27b5c1c53fc2f053e96db74
SHA512e5f2023c15f49f7758d11972e4edf00731956cf69b0b52df6a1bed00dbe756ce87b1a76af9c7dacd3abdae374da8452d6c9790f5e1ebee4ceee9c74e23778280
-
\??\c:\Users\Admin\AppData\Local\Temp\ojpti4pc\ojpti4pc.cmdlineFilesize
312B
MD502b6bc2f3403df03c346c6e2eea04040
SHA1babe8c8f226d4e3f80460e5d09c9879aff29dd6f
SHA256653ba3479a3fb3c0ea3cbaf4e3a456271e4fc866a8e46aece491b2dd70760a4a
SHA512df2fd76bcb6ff38713ff7227fa5a1f0e15fac16582cbb5287aa771a349794628fbd2955fe2297274ea78cf043ebfbb7c031295fae674f7cb5ae321fe1731a17b
-
memory/2004-133-0x0000000000000000-mapping.dmp
-
memory/3492-143-0x0000000000000000-mapping.dmp
-
memory/3492-144-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3492-146-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3492-147-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3636-136-0x0000000000000000-mapping.dmp
-
memory/5100-132-0x0000000000320000-0x0000000000366000-memory.dmpFilesize
280KB
-
memory/5100-141-0x0000000004F90000-0x0000000005022000-memory.dmpFilesize
584KB
-
memory/5100-142-0x0000000005690000-0x000000000572C000-memory.dmpFilesize
624KB