Analysis
-
max time kernel
92s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 19:41
Behavioral task
behavioral1
Sample
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe
Resource
win7-20221111-en
General
-
Target
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe
-
Size
1.1MB
-
MD5
4cebadb09cb1c3823c181fddb594bfac
-
SHA1
4398791a02dcfbe616a63f68d1bb3721e51d071e
-
SHA256
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77
-
SHA512
ea6502cc39d5e83411db629820f9c43c20876bd4554bf2f8f80ba79f6372552486c09693a6a416aaa1d1d5325c2cf33437b888d022398785eb69a58759372bcc
-
SSDEEP
12288:LRG7xFeew+B6PVaJvEUNItZTWtAFpnxkhwIBlEvbkE3BAUVwUU9SlqjQt8MpsPTU:UlJvEUNeWapn+aIBlEvYIbKbcIAIT
Malware Config
Extracted
netwire
bedahogs.100chickens.me:6065
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Msc.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
ABsbWEPM
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
MscRun
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1960-148-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1960-150-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1960-154-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Audio-card.exeMsc.exepid process 1124 Audio-card.exe 1484 Msc.exe -
Processes:
resource yara_rule behavioral2/memory/3740-132-0x0000000000400000-0x000000000065A000-memory.dmp upx behavioral2/memory/3740-136-0x0000000000400000-0x000000000065A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
secinit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kjsfjfb = "C:\\Users\\Admin\\AppData\\Local\\kjsfjfb\\kjsfjfb.vbs" secinit.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
secinit.exedescription pid process target process PID 4464 set thread context of 1960 4464 secinit.exe secinit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exeAudio-card.exedescription pid process target process PID 3740 wrote to memory of 1124 3740 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 3740 wrote to memory of 1124 3740 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 3740 wrote to memory of 1124 3740 92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe Audio-card.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe PID 1124 wrote to memory of 4464 1124 Audio-card.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe"C:\Users\Admin\AppData\Local\Temp\92c1463643f84810e1d1379c2f13fb8f3acbd98fb8e2f151cfc871c4e6b6ec77.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Audio-card.exeC:\Users\Admin\AppData\Local\Audio-card.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\secinit.exesecinit.exe3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\secinit.exe"C:\Windows\SysWOW64\secinit.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\Install\Msc.exe"C:\Users\Admin\AppData\Roaming\Install\Msc.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Audio-card.exeFilesize
415KB
MD5071e878e51a3e0526f59d3286997fe40
SHA1123c462733a813330a2a1a36f190ee8b998f2bf4
SHA25688b16b728a33008b87cc77e05940b019662b0a3444b1148b0f732334ed73dc9b
SHA512275814e27d60da65ad5605a034b0ca4e227689be91002f982ef22adfae7ca0310fe862dfda91a7ee4a823a3fe7be70ff97f50ecc445bda579ebf65c0dd99b282
-
C:\Users\Admin\AppData\Local\Audio-card.exeFilesize
415KB
MD5071e878e51a3e0526f59d3286997fe40
SHA1123c462733a813330a2a1a36f190ee8b998f2bf4
SHA25688b16b728a33008b87cc77e05940b019662b0a3444b1148b0f732334ed73dc9b
SHA512275814e27d60da65ad5605a034b0ca4e227689be91002f982ef22adfae7ca0310fe862dfda91a7ee4a823a3fe7be70ff97f50ecc445bda579ebf65c0dd99b282
-
C:\Users\Admin\AppData\Local\Tm.bmpFilesize
748KB
MD5480bd13fcf1b99fe682ff494281a406c
SHA1e98090f5b7ae6ca8282d4630c62fc9f3de674061
SHA256b2713562600e3e84e445895f1ae224f0ec89963011c37e8cba2706c6638ca276
SHA512453a2f201c947d8a72fb8432ab10afc05f2305c7ec00fb5f996baf88a759587f32f4fa78387c206547a1ba598ab6f9311bfef4fa927d69b8831f0e2caef4ec05
-
C:\Users\Admin\AppData\Roaming\Install\Msc.exeFilesize
9KB
MD53b4b8db765c75b8024a208ae6915223c
SHA121f946bbae92921eead50381370ec54e14f0aa08
SHA256aa365888ab4e37156f06edf20049831ba7cd9203f6617a9632f1c8f3bcafe15a
SHA512f865fc7f9c368212a4bb9f0a02b1fda92f2611e7bf08d10dd2bb1892e3c46c819ce3f76e96e2b32e6e72f6c6cdec2846613b861f7899f93b872b0c4f9a407591
-
memory/1124-140-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/1124-133-0x0000000000000000-mapping.dmp
-
memory/1484-152-0x0000000000000000-mapping.dmp
-
memory/1960-154-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1960-147-0x0000000000000000-mapping.dmp
-
memory/1960-148-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1960-150-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3740-132-0x0000000000400000-0x000000000065A000-memory.dmpFilesize
2.4MB
-
memory/3740-136-0x0000000000400000-0x000000000065A000-memory.dmpFilesize
2.4MB
-
memory/4464-146-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/4464-151-0x0000000010410000-0x00000000104AF000-memory.dmpFilesize
636KB
-
memory/4464-139-0x0000000000000000-mapping.dmp