Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 19:41
Behavioral task
behavioral1
Sample
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe
Resource
win7-20221111-en
General
-
Target
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe
-
Size
1.1MB
-
MD5
4cebadb09cb1c3823c181fddb594bfac
-
SHA1
4398791a02dcfbe616a63f68d1bb3721e51d071e
-
SHA256
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
SHA512
ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc
-
SSDEEP
12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT
Malware Config
Extracted
netwire
bedahogs.100chickens.me:6065
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Msc.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
ABsbWEPM
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
MscRun
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-75-0x0000000000402BCB-mapping.dmp netwire behavioral1/memory/3060-74-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/3060-79-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/3060-83-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Audio-card.exeMsc.exepid process 588 Audio-card.exe 3036 Msc.exe -
Processes:
resource yara_rule behavioral1/memory/316-55-0x0000000000400000-0x000000000065A000-memory.dmp upx behavioral1/memory/316-59-0x0000000000400000-0x000000000065A000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exesecinit.exepid process 316 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe 3060 secinit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
secinit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\kjsfjfb = "C:\\Users\\Admin\\AppData\\Local\\kjsfjfb\\kjsfjfb.vbs" secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
secinit.exedescription pid process target process PID 472 set thread context of 3060 472 secinit.exe secinit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exeAudio-card.exedescription pid process target process PID 316 wrote to memory of 588 316 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 316 wrote to memory of 588 316 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 316 wrote to memory of 588 316 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 316 wrote to memory of 588 316 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe PID 588 wrote to memory of 472 588 Audio-card.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe"C:\Users\Admin\AppData\Local\Temp\92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Audio-card.exeC:\Users\Admin\AppData\Local\Audio-card.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\secinit.exesecinit.exe3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\secinit.exe"C:\Windows\SysWOW64\secinit.exe"4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Install\Msc.exe"C:\Users\Admin\AppData\Roaming\Install\Msc.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Audio-card.exeFilesize
415KB
MD5071e878e51a3e0526f59d3286997fe40
SHA1123c462733a813330a2a1a36f190ee8b998f2bf4
SHA25688b16b728a33008b87cc77e05940b019662b0a3444b1148b0f732334ed73dc9b
SHA512275814e27d60da65ad5605a034b0ca4e227689be91002f982ef22adfae7ca0310fe862dfda91a7ee4a823a3fe7be70ff97f50ecc445bda579ebf65c0dd99b282
-
C:\Users\Admin\AppData\Local\Audio-card.exeFilesize
415KB
MD5071e878e51a3e0526f59d3286997fe40
SHA1123c462733a813330a2a1a36f190ee8b998f2bf4
SHA25688b16b728a33008b87cc77e05940b019662b0a3444b1148b0f732334ed73dc9b
SHA512275814e27d60da65ad5605a034b0ca4e227689be91002f982ef22adfae7ca0310fe862dfda91a7ee4a823a3fe7be70ff97f50ecc445bda579ebf65c0dd99b282
-
C:\Users\Admin\AppData\Local\Tm.bmpFilesize
748KB
MD5480bd13fcf1b99fe682ff494281a406c
SHA1e98090f5b7ae6ca8282d4630c62fc9f3de674061
SHA256b2713562600e3e84e445895f1ae224f0ec89963011c37e8cba2706c6638ca276
SHA512453a2f201c947d8a72fb8432ab10afc05f2305c7ec00fb5f996baf88a759587f32f4fa78387c206547a1ba598ab6f9311bfef4fa927d69b8831f0e2caef4ec05
-
C:\Users\Admin\AppData\Roaming\Install\Msc.exeFilesize
14KB
MD54297f5d9be5f4b5b11a44a7a6aa12fb7
SHA1bfd42ee4aac000d6f62b7a21dba827f71bdbff1f
SHA2564e1e9512ceac308b289e4ef168de9cf9ad30c828ed0df75e6a0afd87af2901b7
SHA5123b232fcc111793aa0de9a1b95423b0269c1c5ff6d5c8d16b2a111e5f3a17cb9619e8f048210adac157980996dedd0ef2236f0b8711577121504b11abe3eb8980
-
\Users\Admin\AppData\Local\Audio-card.exeFilesize
415KB
MD5071e878e51a3e0526f59d3286997fe40
SHA1123c462733a813330a2a1a36f190ee8b998f2bf4
SHA25688b16b728a33008b87cc77e05940b019662b0a3444b1148b0f732334ed73dc9b
SHA512275814e27d60da65ad5605a034b0ca4e227689be91002f982ef22adfae7ca0310fe862dfda91a7ee4a823a3fe7be70ff97f50ecc445bda579ebf65c0dd99b282
-
\Users\Admin\AppData\Roaming\Install\Msc.exeFilesize
14KB
MD54297f5d9be5f4b5b11a44a7a6aa12fb7
SHA1bfd42ee4aac000d6f62b7a21dba827f71bdbff1f
SHA2564e1e9512ceac308b289e4ef168de9cf9ad30c828ed0df75e6a0afd87af2901b7
SHA5123b232fcc111793aa0de9a1b95423b0269c1c5ff6d5c8d16b2a111e5f3a17cb9619e8f048210adac157980996dedd0ef2236f0b8711577121504b11abe3eb8980
-
memory/316-59-0x0000000000400000-0x000000000065A000-memory.dmpFilesize
2.4MB
-
memory/316-55-0x0000000000400000-0x000000000065A000-memory.dmpFilesize
2.4MB
-
memory/316-54-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB
-
memory/472-70-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/472-63-0x0000000000000000-mapping.dmp
-
memory/472-84-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/588-64-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/588-57-0x0000000000000000-mapping.dmp
-
memory/3036-81-0x0000000000000000-mapping.dmp
-
memory/3060-72-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3060-75-0x0000000000402BCB-mapping.dmp
-
memory/3060-74-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3060-79-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3060-83-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB