Analysis
-
max time kernel
106s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe
Resource
win7-20230220-en
General
-
Target
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe
-
Size
1.1MB
-
MD5
9c6d1aca02db373a52401485c376d87e
-
SHA1
9cc4435729a11d7c524d761b67de508b4474b206
-
SHA256
1a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06
-
SHA512
9f4aaadf939a97e2354f18ef1943594edf2c6eb04852e4fecc68ff1eeee9146ff1ec1ac26191f8c9435e39b765da23f14aa835313de670d3235e6b4eb890955d
-
SSDEEP
24576:iCdxte/80jYLT3U1jfsWa/69ryeoEuGfYsoRzDQ:zw80cTsjkWa/FR4
Malware Config
Extracted
netwire
halwachi50.mymediapc.net:5868
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-55-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2004-65-0x0000000000080000-0x00000000000AC000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1484 Host.exe -
Loads dropped DLL 1 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exepid process 2004 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exedescription pid process target process PID 1108 set thread context of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exeHost.exepid process 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1484 Host.exe 1484 Host.exe 1484 Host.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exeHost.exepid process 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1484 Host.exe 1484 Host.exe 1484 Host.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exeHost.exepid process 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1484 Host.exe 1484 Host.exe 1484 Host.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exedescription pid process target process PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 1108 wrote to memory of 2004 1108 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe PID 2004 wrote to memory of 1484 2004 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe Host.exe PID 2004 wrote to memory of 1484 2004 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe Host.exe PID 2004 wrote to memory of 1484 2004 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe Host.exe PID 2004 wrote to memory of 1484 2004 1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe"C:\Users\Admin\AppData\Local\Temp\1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe"C:\Users\Admin\AppData\Local\Temp\1A2C28A7682C26DDB97885FC056DC72B2C2DF437C5FA3.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1484
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59c6d1aca02db373a52401485c376d87e
SHA19cc4435729a11d7c524d761b67de508b4474b206
SHA2561a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06
SHA5129f4aaadf939a97e2354f18ef1943594edf2c6eb04852e4fecc68ff1eeee9146ff1ec1ac26191f8c9435e39b765da23f14aa835313de670d3235e6b4eb890955d
-
Filesize
1.1MB
MD59c6d1aca02db373a52401485c376d87e
SHA19cc4435729a11d7c524d761b67de508b4474b206
SHA2561a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06
SHA5129f4aaadf939a97e2354f18ef1943594edf2c6eb04852e4fecc68ff1eeee9146ff1ec1ac26191f8c9435e39b765da23f14aa835313de670d3235e6b4eb890955d
-
Filesize
1.1MB
MD59c6d1aca02db373a52401485c376d87e
SHA19cc4435729a11d7c524d761b67de508b4474b206
SHA2561a2c28a7682c26ddb97885fc056dc72b2c2df437c5fa3031226e34775095df06
SHA5129f4aaadf939a97e2354f18ef1943594edf2c6eb04852e4fecc68ff1eeee9146ff1ec1ac26191f8c9435e39b765da23f14aa835313de670d3235e6b4eb890955d