Analysis
-
max time kernel
2s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 07:53
Behavioral task
behavioral1
Sample
NEAS.8b9143848571d6a998f563f4d02bf1ca.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8b9143848571d6a998f563f4d02bf1ca.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.8b9143848571d6a998f563f4d02bf1ca.exe
-
Size
1.3MB
-
MD5
8b9143848571d6a998f563f4d02bf1ca
-
SHA1
3cf5a110e487867a5b686b1bc710bb72aafc8d32
-
SHA256
0bdb5008bddb2eb39e73d2376844de7c500b6eb2ea72a6ff13676e4b738daff2
-
SHA512
75ebe9bd06a505dfbde1b78dc4a49085dee91945f6d19b8004ec4573db83c8163faf99e362a821222e1fbf240a163a0ddfd306c047ab874f6b9b6a880350c24f
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYQ:8u0c++OCvkGs9Fa+rd1f26RaYQ
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 18 IoCs
resource yara_rule behavioral2/files/0x0008000000022de1-4.dat netwire behavioral2/files/0x0008000000022de1-7.dat netwire behavioral2/files/0x0008000000022de1-6.dat netwire behavioral2/files/0x0006000000022e00-12.dat netwire behavioral2/memory/4848-11-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/files/0x0006000000022e00-10.dat netwire behavioral2/memory/3612-26-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/files/0x0006000000022e05-29.dat netwire behavioral2/files/0x0006000000022e05-30.dat netwire behavioral2/files/0x0008000000022de1-37.dat netwire behavioral2/files/0x0006000000022e05-46.dat netwire behavioral2/files/0x0008000000022de1-51.dat netwire behavioral2/memory/4164-53-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3612-54-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/files/0x0006000000022e05-62.dat netwire behavioral2/files/0x0008000000022de1-63.dat netwire behavioral2/files/0x0006000000022e05-73.dat netwire behavioral2/memory/2624-80-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2684-14-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2684-22-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
pid Process 4848 Blasthost.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0006000000022e05-29.dat autoit_exe behavioral2/files/0x0006000000022e05-30.dat autoit_exe behavioral2/files/0x0006000000022e05-46.dat autoit_exe behavioral2/files/0x0006000000022e05-62.dat autoit_exe behavioral2/files/0x0006000000022e05-73.dat autoit_exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3516 schtasks.exe 4968 schtasks.exe 2960 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4848 4628 Process not Found 54 PID 4628 wrote to memory of 4848 4628 Process not Found 54 PID 4628 wrote to memory of 4848 4628 Process not Found 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"1⤵PID:4628
-
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"2⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1824
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵PID:3212
-
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵PID:4164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3516
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:1768
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵PID:1624
-
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵PID:2624
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.3MB
MD54901d2bd347f58fbb7dd55bd55281afc
SHA164dc30470adce6762ea347ad5ba41108c0477f07
SHA256024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065
SHA5120c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df
-
Filesize
1.3MB
MD54901d2bd347f58fbb7dd55bd55281afc
SHA164dc30470adce6762ea347ad5ba41108c0477f07
SHA256024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065
SHA5120c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df
-
Filesize
1.3MB
MD54901d2bd347f58fbb7dd55bd55281afc
SHA164dc30470adce6762ea347ad5ba41108c0477f07
SHA256024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065
SHA5120c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df
-
Filesize
1.3MB
MD54901d2bd347f58fbb7dd55bd55281afc
SHA164dc30470adce6762ea347ad5ba41108c0477f07
SHA256024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065
SHA5120c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df
-
Filesize
1.3MB
MD54901d2bd347f58fbb7dd55bd55281afc
SHA164dc30470adce6762ea347ad5ba41108c0477f07
SHA256024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065
SHA5120c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df