Analysis
-
max time kernel
289s -
max time network
284s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 03:10
Static task
static1
Behavioral task
behavioral1
Sample
unk.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
300 seconds
General
-
Target
unk.exe
-
Size
910KB
-
MD5
c7331f4c14752e3fb6bdf174395de01b
-
SHA1
097c79ecbb662e332a490b63cd2a497464afa1a2
-
SHA256
63b408d9416dc9d3c2c4fc8aa11100e5c58a5faf44d210229b867f12d0ce9c02
-
SHA512
a236c11638434438baeb2c9ebc12ec4c1dc19dbcc9e6aac91ba487e8035a2c8c0cba8af4878c98a45983a8ed9f578a1500357611854c83fa51ac8ac6633fe11f
-
SSDEEP
24576:MA3jbtIYqWkWyt5lt+8v50tFA4MLrxN5IC54TWMt:rTrqWkWktrGtFA4Wtgi
Malware Config
Extracted
Family
netwire
C2
69.174.98.165:3369
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
new
-
lock_executable
false
-
offline_keylogger
false
-
password
cash1234
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1876-138-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1876-139-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1876-140-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1876-141-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
unk.exedescription pid process target process PID 4280 set thread context of 1876 4280 unk.exe unk.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
unk.exedescription pid process target process PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe PID 4280 wrote to memory of 1876 4280 unk.exe unk.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1876-137-0x0000000000000000-mapping.dmp
-
memory/1876-138-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1876-139-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1876-140-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1876-141-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/4280-132-0x0000000000B70000-0x0000000000C58000-memory.dmpFilesize
928KB
-
memory/4280-133-0x0000000005AD0000-0x0000000006074000-memory.dmpFilesize
5.6MB
-
memory/4280-134-0x0000000005600000-0x0000000005692000-memory.dmpFilesize
584KB
-
memory/4280-135-0x00000000057A0000-0x00000000057AA000-memory.dmpFilesize
40KB
-
memory/4280-136-0x0000000009370000-0x000000000940C000-memory.dmpFilesize
624KB