Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
a7ff8ea9951ceb3e3660bfc3500b211a.exe
Resource
win7-20230712-en
General
-
Target
a7ff8ea9951ceb3e3660bfc3500b211a.exe
-
Size
112KB
-
MD5
a7ff8ea9951ceb3e3660bfc3500b211a
-
SHA1
547237200e4044f1f6e2165b6d9d060adab4ab71
-
SHA256
58e6a469f1ace9ec112de054209783ad6dd469a0794f20a998a0dcdf02a4834e
-
SHA512
f06d47f89ef2cced0d0bc5aa69622ce74b2420b108e6c07ed83be4d93b151eb4025cd5d2005c5f65e1c59a734609eda421c27a55903546a59698ced2b8087d9a
-
SSDEEP
3072:lh0seFp3R/lmAZCx+Ru8ymVqSSWT78SpeDT2d:lh0s8p373+SNToSpF
Malware Config
Extracted
netwire
fartgul.duckdns.org:3360
fartgul.duckdns.org:3369
fartgul.duckdns.org:4000
fratful.dynu.net:4000
fratful.dynu.net:3369
fratful.dynu.net:3360
tartful.hopto.org:3360
tartful.hopto.org:3369
tartful.hopto.org:4000
futerty.mooo.com:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Pay
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
KcLLFWch
-
offline_keylogger
true
-
password
Singlesingle1@
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/2416-142-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/2416-144-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/2416-145-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/2416-147-0x0000000000400000-0x0000000000425000-memory.dmp netwire -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yVqZv661.url a7ff8ea9951ceb3e3660bfc3500b211a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yVqZv661.url a7ff8ea9951ceb3e3660bfc3500b211a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2416 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 89 -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2416 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 89 PID 1900 wrote to memory of 2416 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 89 PID 1900 wrote to memory of 2416 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 89 PID 1900 wrote to memory of 2416 1900 a7ff8ea9951ceb3e3660bfc3500b211a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ff8ea9951ceb3e3660bfc3500b211a.exe"C:\Users\Admin\AppData\Local\Temp\a7ff8ea9951ceb3e3660bfc3500b211a.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\a7ff8ea9951ceb3e3660bfc3500b211a.exe"C:\Users\Admin\AppData\Local\Temp\a7ff8ea9951ceb3e3660bfc3500b211a.exe"2⤵PID:2416
-