Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 05:47

General

  • Target

    df450053a3624d5a3ec698bbd0f36c73.exe

  • Size

    312KB

  • MD5

    df450053a3624d5a3ec698bbd0f36c73

  • SHA1

    0b47abd8fafd93e3a511bccd02022e7ab970c267

  • SHA256

    77d866ee2219b110e1999464f0d0c4913f4ad1d2b8dd4e2ca456da22cc18b9f2

  • SHA512

    5ec462faf27b7dcd11eea2152d7c5d335024e596ebe1d7afb492897091f3262fb3e6be6df6e84966c0086c8596dd8d10e1bd230cad393778f940e8b6af6ccce9

  • SSDEEP

    6144:WYa6AP1e4pG5Jy8Li7b/xxulxRv+lmIi7GMff56pw:WYqJQ5Jy8wklxROmT7GMIpw

Malware Config

Signatures

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df450053a3624d5a3ec698bbd0f36c73.exe
    "C:\Users\Admin\AppData\Local\Temp\df450053a3624d5a3ec698bbd0f36c73.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
      "C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe" C:\Users\Admin\AppData\Local\Temp\trrnr.c
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
        "C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe"
        3⤵
        • Executes dropped EXE
        PID:3484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 452
          4⤵
          • Program crash
          PID:4520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3484 -ip 3484
    1⤵
      PID:3260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rqxtrq.d
      Filesize

      163KB

      MD5

      ed0d1740abcb6f94444c47913bb341c7

      SHA1

      28e621349c065d280f9742f2d707c323994e0c72

      SHA256

      84cb13a284559679d88809bdf0b8ac8e12f761e7a993fd866800619b9292e140

      SHA512

      4d2bff4e38cce2b67c65238231bef93bb611d746ea3cbde593461f226eb5404582d1c8979af0cfa79e8278485edcd9bd66d61127e35a0641001238ff82da7512

    • C:\Users\Admin\AppData\Local\Temp\trrnr.c
      Filesize

      7KB

      MD5

      f08788ddaf0f297f11eef7a9f709a479

      SHA1

      9ac5b634a406a2356028ed87ca1324451104c8e8

      SHA256

      c71da89acfa2dcdfb385201ec7237312f62492561996d9ec61b495a29d85276a

      SHA512

      40cc49a8e27dcc847f71a6a11f8765c7a82248e586334ff13dcf723b395320f1a8985b85549e92ebea312396ea810bf6c71b62b95cce20c4d1d158e867341407

    • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
      Filesize

      15KB

      MD5

      df00ae98086d6cf0f6578a472b8c530c

      SHA1

      4cbd7896af95054b8846d59dd280ae465371d582

      SHA256

      3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

      SHA512

      b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

    • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
      Filesize

      15KB

      MD5

      df00ae98086d6cf0f6578a472b8c530c

      SHA1

      4cbd7896af95054b8846d59dd280ae465371d582

      SHA256

      3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

      SHA512

      b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

    • C:\Users\Admin\AppData\Local\Temp\utofycuapq.exe
      Filesize

      15KB

      MD5

      df00ae98086d6cf0f6578a472b8c530c

      SHA1

      4cbd7896af95054b8846d59dd280ae465371d582

      SHA256

      3c64a0eefd988fa695f4f43c8ab39b004b0931be52cfb283e82018dc8eb985ec

      SHA512

      b8ffec91e72361788ec721d00edd8060c74a0e05b2a5ab6bd369d0ee354454f8c8fd9d867c75c8b01b02b7cf116c1f9849ba69516c34be8d44fc01f0ece074e1

    • memory/3484-142-0x0000000000530000-0x000000000055B000-memory.dmp
      Filesize

      172KB

    • memory/3484-148-0x0000000000530000-0x000000000055B000-memory.dmp
      Filesize

      172KB

    • memory/3484-153-0x0000000000530000-0x000000000055B000-memory.dmp
      Filesize

      172KB