Analysis
-
max time kernel
84s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-01-2023 10:53
Static task
static1
Behavioral task
behavioral1
Sample
INQ 80469046 DBT.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
INQ 80469046 DBT.exe
Resource
win10v2004-20220812-en
General
-
Target
INQ 80469046 DBT.exe
-
Size
1001KB
-
MD5
84e792790474ec5d19a491b9ec553b3d
-
SHA1
25d20a249b0e1d38ecc0f368605ff39776645d1a
-
SHA256
1801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
-
SHA512
570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
SSDEEP
24576:7gPD5Nb3ewHdqoXpDLycm6AP+nYWUP4tFd8vHX6E/VhL:7gPD5Nb/Jycm62+neP4tF6360VhL
Malware Config
Extracted
netwire
212.193.30.230:6063
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
TestLink.lnk
-
lock_executable
false
-
offline_keylogger
false
-
password
Password123@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-69-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1212-71-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1212-72-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1212-74-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1212-75-0x000000000041AD7B-mapping.dmp netwire behavioral1/memory/1212-78-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1212-83-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1948-106-0x000000000041AD7B-mapping.dmp netwire behavioral1/memory/1948-110-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1948-114-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1752 Host.exe 1948 Host.exe -
Drops startup file 1 IoCs
Processes:
Host.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TestLink.lnk Host.exe -
Loads dropped DLL 3 IoCs
Processes:
INQ 80469046 DBT.exeHost.exepid process 1212 INQ 80469046 DBT.exe 1212 INQ 80469046 DBT.exe 1948 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\vÀÙá=ëÏþ½Pe… = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
INQ 80469046 DBT.exeHost.exedescription pid process target process PID 2028 set thread context of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 1752 set thread context of 1948 1752 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
INQ 80469046 DBT.exepowershell.exeHost.exepowershell.exepid process 2028 INQ 80469046 DBT.exe 2028 INQ 80469046 DBT.exe 1796 powershell.exe 1752 Host.exe 1760 powershell.exe 1752 Host.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
INQ 80469046 DBT.exepowershell.exeHost.exepowershell.exedescription pid process Token: SeDebugPrivilege 2028 INQ 80469046 DBT.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 1752 Host.exe Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
INQ 80469046 DBT.exeINQ 80469046 DBT.exeHost.exedescription pid process target process PID 2028 wrote to memory of 1796 2028 INQ 80469046 DBT.exe powershell.exe PID 2028 wrote to memory of 1796 2028 INQ 80469046 DBT.exe powershell.exe PID 2028 wrote to memory of 1796 2028 INQ 80469046 DBT.exe powershell.exe PID 2028 wrote to memory of 1796 2028 INQ 80469046 DBT.exe powershell.exe PID 2028 wrote to memory of 472 2028 INQ 80469046 DBT.exe schtasks.exe PID 2028 wrote to memory of 472 2028 INQ 80469046 DBT.exe schtasks.exe PID 2028 wrote to memory of 472 2028 INQ 80469046 DBT.exe schtasks.exe PID 2028 wrote to memory of 472 2028 INQ 80469046 DBT.exe schtasks.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 2028 wrote to memory of 1212 2028 INQ 80469046 DBT.exe INQ 80469046 DBT.exe PID 1212 wrote to memory of 1752 1212 INQ 80469046 DBT.exe Host.exe PID 1212 wrote to memory of 1752 1212 INQ 80469046 DBT.exe Host.exe PID 1212 wrote to memory of 1752 1212 INQ 80469046 DBT.exe Host.exe PID 1212 wrote to memory of 1752 1212 INQ 80469046 DBT.exe Host.exe PID 1752 wrote to memory of 1760 1752 Host.exe powershell.exe PID 1752 wrote to memory of 1760 1752 Host.exe powershell.exe PID 1752 wrote to memory of 1760 1752 Host.exe powershell.exe PID 1752 wrote to memory of 1760 1752 Host.exe powershell.exe PID 1752 wrote to memory of 1632 1752 Host.exe schtasks.exe PID 1752 wrote to memory of 1632 1752 Host.exe schtasks.exe PID 1752 wrote to memory of 1632 1752 Host.exe schtasks.exe PID 1752 wrote to memory of 1632 1752 Host.exe schtasks.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe PID 1752 wrote to memory of 1948 1752 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQ 80469046 DBT.exe"C:\Users\Admin\AppData\Local\Temp\INQ 80469046 DBT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qKcaUVIbG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qKcaUVIbG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F7B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\INQ 80469046 DBT.exe"C:\Users\Admin\AppData\Local\Temp\INQ 80469046 DBT.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qKcaUVIbG.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qKcaUVIbG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3DEB.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3DEB.tmpFilesize
1KB
MD5f4a5cb82c555c2df62d2d35db95edec6
SHA1fe6706a0ed27e519ce2ddf64306e02aadf7a1791
SHA256e3122e0086bc2a17945dfdadf25d5a86927dd552abee708b2d741f75cfdd2aee
SHA512745e2914769af645a320c469b1989768e704017d970ca4911fa31e25913d5420615a26e1325309b3a8e0b8e236a77d8c2d4dbd39a20a42c8f4e2ae97018df787
-
C:\Users\Admin\AppData\Local\Temp\tmp9F7B.tmpFilesize
1KB
MD5f4a5cb82c555c2df62d2d35db95edec6
SHA1fe6706a0ed27e519ce2ddf64306e02aadf7a1791
SHA256e3122e0086bc2a17945dfdadf25d5a86927dd552abee708b2d741f75cfdd2aee
SHA512745e2914769af645a320c469b1989768e704017d970ca4911fa31e25913d5420615a26e1325309b3a8e0b8e236a77d8c2d4dbd39a20a42c8f4e2ae97018df787
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD59a52ad96b57ab74f91dfb9b762cdf987
SHA1cccb31684c2768f15579e0bcbf8fa2530c8f7f75
SHA256c468a5295fec6a68cdf536cc41574e7248bd88afe873df13c01bf755584c8b3a
SHA512ce2a0f257d590eafe62d79282876705f71d44005ab430bc97fb1665d4357ec8cdea613c71a4d33b6464b8b8dea73442216ae9e50e6f21ba291fca87d7ffbfb8f
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
1001KB
MD584e792790474ec5d19a491b9ec553b3d
SHA125d20a249b0e1d38ecc0f368605ff39776645d1a
SHA2561801a874e23097185c396dfcc625bebae49577d65a9177332b8f791810054b4e
SHA512570126783e260cd4b638804cb19e27593019526f72aa0f64868dbc05a19905cedaaa27f2a40779d39297b96e973c5ef7a59b809082032c25adbf2dc6370282ba
-
memory/472-60-0x0000000000000000-mapping.dmp
-
memory/1212-65-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-69-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-71-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-72-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-74-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-75-0x000000000041AD7B-mapping.dmp
-
memory/1212-78-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-67-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-64-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1212-83-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1632-91-0x0000000000000000-mapping.dmp
-
memory/1752-85-0x0000000000BC0000-0x0000000000CC0000-memory.dmpFilesize
1024KB
-
memory/1752-87-0x00000000002C0000-0x00000000002D6000-memory.dmpFilesize
88KB
-
memory/1752-81-0x0000000000000000-mapping.dmp
-
memory/1760-90-0x0000000000000000-mapping.dmp
-
memory/1760-113-0x000000006EB50000-0x000000006F0FB000-memory.dmpFilesize
5.7MB
-
memory/1796-88-0x000000006E050000-0x000000006E5FB000-memory.dmpFilesize
5.7MB
-
memory/1796-89-0x000000006E050000-0x000000006E5FB000-memory.dmpFilesize
5.7MB
-
memory/1796-59-0x0000000000000000-mapping.dmp
-
memory/1948-110-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1948-114-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1948-106-0x000000000041AD7B-mapping.dmp
-
memory/2028-58-0x00000000056F0000-0x0000000005788000-memory.dmpFilesize
608KB
-
memory/2028-57-0x0000000000530000-0x000000000053A000-memory.dmpFilesize
40KB
-
memory/2028-56-0x0000000000410000-0x0000000000426000-memory.dmpFilesize
88KB
-
memory/2028-55-0x0000000075151000-0x0000000075153000-memory.dmpFilesize
8KB
-
memory/2028-63-0x0000000005150000-0x00000000051B0000-memory.dmpFilesize
384KB
-
memory/2028-54-0x0000000001020000-0x0000000001120000-memory.dmpFilesize
1024KB