Analysis
-
max time kernel
115s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13-01-2023 18:02
Static task
static1
Behavioral task
behavioral1
Sample
91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe
Resource
win7-20220812-es
General
-
Target
91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe
-
Size
420KB
-
MD5
1517814c4d44cc632abb52d2d6307f15
-
SHA1
9ee0404b76fe5bda2692f049bb9fc78e17240708
-
SHA256
91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac
-
SHA512
34e0804548803b4ece092061dc287078f5853b9d73d7759b403fdc5bbc4141ddad2b146c06edf8dbaa5ce055c62e1106e91df05a7866402f47be6f28acddaf7a
-
SSDEEP
6144:QjbeiyDBJNEeHfZEW6GH5W288L5ABAYRb+m112Mppeaibjz90645wZUS+:Qu1PzgGH5W28oANn112tLOE+
Malware Config
Extracted
netwire
qualitytrade12.hopto.org:3194
-
activex_autorun
true
-
activex_key
{KEW5251T-4080-L0OG-0866-B1E0A86Y18A5}
-
copy_executable
true
-
delete_original
false
-
host_id
NEWCLIENT
-
install_path
%AppData%\Install\excel.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
RPlPfmOq
-
offline_keylogger
true
-
password
master45
-
registry_autorun
true
-
startup_name
Adobe
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4592-140-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/4592-144-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/4592-145-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/4592-148-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
1.xyz1.xyzpid process 5008 1.xyz 4592 1.xyz -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz upx behavioral2/memory/5008-135-0x0000000000400000-0x0000000001400000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz upx behavioral2/memory/5008-149-0x0000000000400000-0x0000000001400000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.xyzdescription pid process target process PID 5008 set thread context of 4592 5008 1.xyz 1.xyz -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4208 4592 WerFault.exe 1.xyz 2176 1408 WerFault.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1.xyzmspaint.exepid process 5008 1.xyz 5008 1.xyz 1036 mspaint.exe 1036 mspaint.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 640 -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
1.xyzmspaint.exepid process 5008 1.xyz 5008 1.xyz 1036 mspaint.exe 1036 mspaint.exe 1036 mspaint.exe 1036 mspaint.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe1.xyzcmd.exenet.exedescription pid process target process PID 4876 wrote to memory of 5008 4876 91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe 1.xyz PID 4876 wrote to memory of 5008 4876 91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe 1.xyz PID 4876 wrote to memory of 5008 4876 91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe 1.xyz PID 5008 wrote to memory of 4280 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4280 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4280 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4644 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4644 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4644 5008 1.xyz cmd.exe PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 5008 wrote to memory of 4592 5008 1.xyz 1.xyz PID 4644 wrote to memory of 3128 4644 cmd.exe net.exe PID 4644 wrote to memory of 3128 4644 cmd.exe net.exe PID 4644 wrote to memory of 3128 4644 cmd.exe net.exe PID 3128 wrote to memory of 796 3128 net.exe net1.exe PID 3128 wrote to memory of 796 3128 net.exe net1.exe PID 3128 wrote to memory of 796 3128 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe"C:\Users\Admin\AppData\Local\Temp\91bfa2445d998425c81f30d293235429ca6a8c6c8f326536478952a2a6754aac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
PID:4280 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz3⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 5764⤵
- Program crash
PID:4208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc1⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4592 -ip 45921⤵PID:60
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 544 -p 1408 -ip 14081⤵PID:2724
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1408 -s 17441⤵
- Program crash
PID:2176
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\EditConnect.bmp"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2836
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\UpdateAssert.fon1⤵PID:2256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xy_Filesize
132KB
MD54b28fc60df0738257092268a36fe321e
SHA1f3440893908f4e59099664ce0abd323ada87e05c
SHA2567b7170132465e0f87bf9a411324a07c27dd49268f4e9fd8f9d2b61e703b4bd29
SHA5129335d367203da5d9cb452ca12eda00aa26ce451b0ed5d4fea3fbe1cee258b35b983ce96f25745855063fd35f065ed865cce9e9053c5bb29f1b97db6e31e5cb3e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzFilesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzFilesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzFilesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932
-
memory/796-147-0x0000000000000000-mapping.dmp
-
memory/3128-146-0x0000000000000000-mapping.dmp
-
memory/4280-137-0x0000000000000000-mapping.dmp
-
memory/4592-139-0x0000000000000000-mapping.dmp
-
memory/4592-140-0x0000000000400000-0x0000000001080000-memory.dmpFilesize
12.5MB
-
memory/4592-144-0x0000000000400000-0x0000000001080000-memory.dmpFilesize
12.5MB
-
memory/4592-145-0x0000000000400000-0x0000000001080000-memory.dmpFilesize
12.5MB
-
memory/4592-148-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4644-138-0x0000000000000000-mapping.dmp
-
memory/5008-132-0x0000000000000000-mapping.dmp
-
memory/5008-143-0x000000001A100000-0x000000001A105000-memory.dmpFilesize
20KB
-
memory/5008-135-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/5008-149-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB