Analysis

  • max time kernel
    2s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 07:53

General

  • Target

    NEAS.8b9143848571d6a998f563f4d02bf1ca.exe

  • Size

    1.3MB

  • MD5

    8b9143848571d6a998f563f4d02bf1ca

  • SHA1

    3cf5a110e487867a5b686b1bc710bb72aafc8d32

  • SHA256

    0bdb5008bddb2eb39e73d2376844de7c500b6eb2ea72a6ff13676e4b738daff2

  • SHA512

    75ebe9bd06a505dfbde1b78dc4a49085dee91945f6d19b8004ec4573db83c8163faf99e362a821222e1fbf240a163a0ddfd306c047ab874f6b9b6a880350c24f

  • SSDEEP

    24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYQ:8u0c++OCvkGs9Fa+rd1f26RaYQ

Malware Config

Extracted

Family

netwire

C2

Wealthy2019.com.strangled.net:20190

wealthyme.ddns.net:20190

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    sunshineslisa

  • install_path

    %AppData%\Imgburn\Host.exe

  • keylogger_dir

    %AppData%\Logs\Imgburn\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    sucess

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

warzonerat

C2

wealth.warzonedns.com:5202

Signatures

  • NetWire RAT payload 18 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"
    1⤵
      PID:4628
      • C:\Users\Admin\AppData\Roaming\Blasthost.exe
        "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
        2⤵
        • Executes dropped EXE
        PID:4848
        • C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
          "C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"
          3⤵
            PID:3612
        • C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe
          "C:\Users\Admin\AppData\Local\Temp\NEAS.8b9143848571d6a998f563f4d02bf1ca.exe"
          2⤵
            PID:2684
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              3⤵
                PID:1824
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
              2⤵
              • Creates scheduled task(s)
              PID:2960
          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
            C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
            1⤵
              PID:3212
              • C:\Users\Admin\AppData\Roaming\Blasthost.exe
                "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
                2⤵
                  PID:4164
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
                  2⤵
                  • Creates scheduled task(s)
                  PID:3516
                • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
                  "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
                  2⤵
                    PID:3472
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  1⤵
                    PID:1768
                  • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
                    C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
                    1⤵
                      PID:1624
                      • C:\Users\Admin\AppData\Roaming\Blasthost.exe
                        "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
                        2⤵
                          PID:2624
                        • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
                          "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
                          2⤵
                            PID:1228
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              3⤵
                                PID:2560
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
                              2⤵
                              • Creates scheduled task(s)
                              PID:4968

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Blasthost.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

                            Filesize

                            132KB

                            MD5

                            6087bf6af59b9c531f2c9bb421d5e902

                            SHA1

                            8bc0f1596c986179b82585c703bacae6d2a00316

                            SHA256

                            3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

                            SHA512

                            c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

                          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

                            Filesize

                            1.3MB

                            MD5

                            4901d2bd347f58fbb7dd55bd55281afc

                            SHA1

                            64dc30470adce6762ea347ad5ba41108c0477f07

                            SHA256

                            024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065

                            SHA512

                            0c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df

                          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

                            Filesize

                            1.3MB

                            MD5

                            4901d2bd347f58fbb7dd55bd55281afc

                            SHA1

                            64dc30470adce6762ea347ad5ba41108c0477f07

                            SHA256

                            024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065

                            SHA512

                            0c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df

                          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

                            Filesize

                            1.3MB

                            MD5

                            4901d2bd347f58fbb7dd55bd55281afc

                            SHA1

                            64dc30470adce6762ea347ad5ba41108c0477f07

                            SHA256

                            024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065

                            SHA512

                            0c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df

                          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

                            Filesize

                            1.3MB

                            MD5

                            4901d2bd347f58fbb7dd55bd55281afc

                            SHA1

                            64dc30470adce6762ea347ad5ba41108c0477f07

                            SHA256

                            024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065

                            SHA512

                            0c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df

                          • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

                            Filesize

                            1.3MB

                            MD5

                            4901d2bd347f58fbb7dd55bd55281afc

                            SHA1

                            64dc30470adce6762ea347ad5ba41108c0477f07

                            SHA256

                            024074a5518e33a27b5c2ac9650ef3bda7a4e1ae23c501303de7b3abf8969065

                            SHA512

                            0c94c850f02140fda5a4d85ac512f7e614de1823fcea8e0c537df7b0e8a0951c8e0818c4bf333ed98744a42a42c9ee811d5082965e7fbce50c004716028862df

                          • memory/1768-48-0x0000000001220000-0x0000000001221000-memory.dmp

                            Filesize

                            4KB

                          • memory/1824-24-0x0000000001230000-0x0000000001231000-memory.dmp

                            Filesize

                            4KB

                          • memory/2560-75-0x00000000005F0000-0x00000000005F1000-memory.dmp

                            Filesize

                            4KB

                          • memory/2624-80-0x0000000000400000-0x000000000042C000-memory.dmp

                            Filesize

                            176KB

                          • memory/2684-22-0x0000000000400000-0x000000000041D000-memory.dmp

                            Filesize

                            116KB

                          • memory/2684-14-0x0000000000400000-0x000000000041D000-memory.dmp

                            Filesize

                            116KB

                          • memory/3612-54-0x0000000000400000-0x000000000042C000-memory.dmp

                            Filesize

                            176KB

                          • memory/3612-26-0x0000000000400000-0x000000000042C000-memory.dmp

                            Filesize

                            176KB

                          • memory/4164-53-0x0000000000400000-0x000000000042C000-memory.dmp

                            Filesize

                            176KB

                          • memory/4628-13-0x0000000001D90000-0x0000000001D91000-memory.dmp

                            Filesize

                            4KB

                          • memory/4848-11-0x0000000000400000-0x000000000042C000-memory.dmp

                            Filesize

                            176KB