Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2023 15:51

General

  • Target

    file.exe

  • Size

    5.5MB

  • MD5

    36e404e81aa3f4682eedf6536507d91b

  • SHA1

    116a1aaa2e4a06cb97395225ccabe6b0d66e4be6

  • SHA256

    2cc249a2be6c8f60714f21e8d0b4d4dc6cbda4cde7acfbfbfc1fca9e93778d84

  • SHA512

    85cadf3b80c69e4e1b8b81b1c9ea45722c7aa14d2ece3950b762c2cc350805c8f2bd80ba9ab71d2f7c58046cb6f0d0be3f1dae77962c14125cc8a5feef439746

  • SSDEEP

    98304:eDVp+Z/vQvvPn/pPBwYOb79BD+17rpEd6R3ubV3SDfJtLzlkCAdsOuwrGfhaFEti:eDVp+Z/vQvvPn/puZBD+17rpEd6R3ubL

Malware Config

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
      PID:4400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 1072
        2⤵
        • Program crash
        PID:5080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4400 -ip 4400
      1⤵
        PID:724

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4400-132-0x0000000000790000-0x0000000000D0C000-memory.dmp
        Filesize

        5.5MB

      • memory/4400-133-0x00000000056C0000-0x000000000575C000-memory.dmp
        Filesize

        624KB

      • memory/4400-134-0x0000000005D40000-0x00000000062E4000-memory.dmp
        Filesize

        5.6MB

      • memory/4400-135-0x0000000005790000-0x0000000005822000-memory.dmp
        Filesize

        584KB

      • memory/4400-136-0x0000000005760000-0x000000000576A000-memory.dmp
        Filesize

        40KB

      • memory/4400-137-0x0000000005890000-0x00000000058E6000-memory.dmp
        Filesize

        344KB