Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 03:15

General

  • Target

    77d866ee2219b110e1999464f0d0c4913f4ad1d2b8dd4e2ca456da22cc18b9f2.exe

  • Size

    312KB

  • MD5

    df450053a3624d5a3ec698bbd0f36c73

  • SHA1

    0b47abd8fafd93e3a511bccd02022e7ab970c267

  • SHA256

    77d866ee2219b110e1999464f0d0c4913f4ad1d2b8dd4e2ca456da22cc18b9f2

  • SHA512

    5ec462faf27b7dcd11eea2152d7c5d335024e596ebe1d7afb492897091f3262fb3e6be6df6e84966c0086c8596dd8d10e1bd230cad393778f940e8b6af6ccce9

  • SSDEEP

    6144:WYa6AP1e4pG5Jy8Li7b/xxulxRv+lmIi7GMff56pw:WYqJQ5Jy8wklxROmT7GMIpw

Malware Config

Extracted

Family

netwire

C2

braboz.duckdns.org:1992

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    prosession

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    golddigger

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77d866ee2219b110e1999464f0d0c4913f4ad1d2b8dd4e2ca456da22cc18b9f2.exe
    "C:\Users\Admin\AppData\Local\Temp\77d866ee2219b110e1999464f0d0c4913f4ad1d2b8dd4e2ca456da22cc18b9f2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
      "C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe" C:\Users\Admin\AppData\Local\Temp\trrnr.c
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
        "C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe"
        3⤵
        • Executes dropped EXE
        PID:800

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rqxtrq.d
    Filesize

    163KB

    MD5

    ed0d1740abcb6f94444c47913bb341c7

    SHA1

    28e621349c065d280f9742f2d707c323994e0c72

    SHA256

    84cb13a284559679d88809bdf0b8ac8e12f761e7a993fd866800619b9292e140

    SHA512

    4d2bff4e38cce2b67c65238231bef93bb611d746ea3cbde593461f226eb5404582d1c8979af0cfa79e8278485edcd9bd66d61127e35a0641001238ff82da7512

  • C:\Users\Admin\AppData\Local\Temp\trrnr.c
    Filesize

    7KB

    MD5

    f08788ddaf0f297f11eef7a9f709a479

    SHA1

    9ac5b634a406a2356028ed87ca1324451104c8e8

    SHA256

    c71da89acfa2dcdfb385201ec7237312f62492561996d9ec61b495a29d85276a

    SHA512

    40cc49a8e27dcc847f71a6a11f8765c7a82248e586334ff13dcf723b395320f1a8985b85549e92ebea312396ea810bf6c71b62b95cce20c4d1d158e867341407

  • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
    Filesize

    15KB

    MD5

    df00ae98086d6cf0f6578a472b8c530c

    SHA1

    4cbd7896af95054b8846d59dd280ae465371d582

    SHA256

    3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

    SHA512

    b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

  • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
    Filesize

    15KB

    MD5

    df00ae98086d6cf0f6578a472b8c530c

    SHA1

    4cbd7896af95054b8846d59dd280ae465371d582

    SHA256

    3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

    SHA512

    b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

  • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
    Filesize

    15KB

    MD5

    df00ae98086d6cf0f6578a472b8c530c

    SHA1

    4cbd7896af95054b8846d59dd280ae465371d582

    SHA256

    3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

    SHA512

    b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

  • memory/800-143-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/800-145-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/800-146-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/800-148-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2624-140-0x0000000001600000-0x0000000001602000-memory.dmp
    Filesize

    8KB