Analysis
-
max time kernel
80s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-04-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe
Resource
win10v2004-20230220-en
General
-
Target
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe
-
Size
453KB
-
MD5
a7c46dcd7583f9b2fdca60638393fe3d
-
SHA1
9d095498c250a1c8b8c1b9b7064d7be934b0ac1a
-
SHA256
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5
-
SHA512
7e588fd29d927c232efcf1ab7334e0ee663c6b67bbd819823cb093d9787ceb5fbadd56a11145107bafe120889d4c1acc425e7ca2cf42fa1b5cb01437e25cda47
-
SSDEEP
12288:yhKODnJnFSRyDy/J9JLtpx+/tADdzw/aFo:yoOHSSaPJh+/tADdI
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Marketplace
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/1556-55-0x00000000020E0000-0x0000000002152000-memory.dmp netwire behavioral1/memory/1556-57-0x0000000000960000-0x0000000000993000-memory.dmp netwire behavioral1/memory/1556-61-0x000000001BC10000-0x000000001BC90000-memory.dmp netwire behavioral1/memory/612-62-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-63-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-64-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-65-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-67-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-85-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/612-86-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Core1 .NET packer 2 IoCs
Detects packer/loader used by .NET malware.
Processes:
resource yara_rule behavioral1/memory/1556-55-0x00000000020E0000-0x0000000002152000-memory.dmp Core1 behavioral1/memory/1556-61-0x000000001BC10000-0x000000001BC90000-memory.dmp Core1 -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1756 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\Experience.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Experience.exe" 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exedescription pid process target process PID 1556 set thread context of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 set thread context of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Nitro\Pro\13\NitroPDF.exe svchost.exe -
Modifies registry class 31 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 svchost.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 1756 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exedescription pid process target process PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 612 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe PID 1556 wrote to memory of 1756 1556 34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe"C:\Users\Admin\AppData\Local\Temp\34104d412d856c9ee60e6db6cce0fbb03c766988ab6e733a867eeac26cd9bad5.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWow64\svchost.exe"C:\\Windows\\SysWow64\\svchost.exe"2⤵
-
C:\Windows\SysWow64\svchost.exe"C:\\Windows\\SysWow64\\svchost.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\dup2patcher.dllFilesize
234KB
MD56f8b0021a206e48a50986333b87a5245
SHA1b650435b6e1a0cc59e2c232f83a9796770f85f96
SHA256326ca48a87c1e82e1fcaf95acd5b8c09d92f712591ba88928f48e093c485c40a
SHA512b7f066786f20934148d718689fbcdf830a0a04ebf46092c48b6ec06ef5a989518cb23659a7ecbcef5b689a58546f2ac688a861887611cd3ee62b8ade62b4cc27
-
memory/612-66-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/612-86-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-85-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-58-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-59-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-67-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-60-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-62-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-63-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-64-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/612-65-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1556-69-0x0000000000970000-0x00000000009B1000-memory.dmpFilesize
260KB
-
memory/1556-57-0x0000000000960000-0x0000000000993000-memory.dmpFilesize
204KB
-
memory/1556-54-0x000000013FB50000-0x000000013FBC6000-memory.dmpFilesize
472KB
-
memory/1556-55-0x00000000020E0000-0x0000000002152000-memory.dmpFilesize
456KB
-
memory/1556-56-0x0000000000840000-0x0000000000848000-memory.dmpFilesize
32KB
-
memory/1556-61-0x000000001BC10000-0x000000001BC90000-memory.dmpFilesize
512KB
-
memory/1756-72-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-75-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-74-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-77-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-79-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-73-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-71-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-70-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-87-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1756-88-0x00000000749F0000-0x0000000074A43000-memory.dmpFilesize
332KB
-
memory/1756-89-0x0000000003620000-0x0000000003622000-memory.dmpFilesize
8KB
-
memory/1756-90-0x0000000003560000-0x0000000003561000-memory.dmpFilesize
4KB
-
memory/1756-91-0x0000000003560000-0x0000000003561000-memory.dmpFilesize
4KB