Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
42490f9237fa30051acbda579f983bfc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42490f9237fa30051acbda579f983bfc.exe
Resource
win10v2004-20231215-en
General
-
Target
42490f9237fa30051acbda579f983bfc.exe
-
Size
1.8MB
-
MD5
42490f9237fa30051acbda579f983bfc
-
SHA1
2ec5633ee543bec37f50ae0c74bb3470f4865e41
-
SHA256
deb81ddd886fad1e97436e3ce147dc6d86d00dee10571d0c0e474c1aa11031e3
-
SHA512
9d8cb0a3fb6b2926b0a6c13cd2a5cca432707376c4a86a9bd060a563b3480ce2d008867922c0b70f808718f43813305fee07ba2c60fc057f0b3ae7e660425968
-
SSDEEP
49152:xhtORUwc166NlRq7vLSUtwt4wv0WroWFeZkP9aiK+d:xhtORUB166NHq7vLZc1cWBFeZkP9aiKC
Malware Config
Extracted
netwire
soludada.ddns.net:1984
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
darf
-
install_path
%AppData%\darf\darf.exe
-
keylogger_dir
%AppData%\darf\
-
lock_executable
true
-
mutex
fYIqDmQC
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
darf
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2756-1-0x0000000000270000-0x000000000028E000-memory.dmp netwire behavioral1/memory/2756-2-0x0000000000330000-0x0000000000358000-memory.dmp netwire behavioral1/memory/2756-11-0x0000000000330000-0x0000000000358000-memory.dmp netwire behavioral1/memory/2720-12-0x0000000001CF0000-0x0000000001D18000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2720 darf.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 42490f9237fa30051acbda579f983bfc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\darf = "C:\\Users\\Admin\\AppData\\Roaming\\darf\\darf.exe" darf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2720 2756 42490f9237fa30051acbda579f983bfc.exe 28 PID 2756 wrote to memory of 2720 2756 42490f9237fa30051acbda579f983bfc.exe 28 PID 2756 wrote to memory of 2720 2756 42490f9237fa30051acbda579f983bfc.exe 28 PID 2756 wrote to memory of 2720 2756 42490f9237fa30051acbda579f983bfc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe"C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\darf\darf.exe"C:\Users\Admin\AppData\Roaming\darf\darf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD542490f9237fa30051acbda579f983bfc
SHA12ec5633ee543bec37f50ae0c74bb3470f4865e41
SHA256deb81ddd886fad1e97436e3ce147dc6d86d00dee10571d0c0e474c1aa11031e3
SHA5129d8cb0a3fb6b2926b0a6c13cd2a5cca432707376c4a86a9bd060a563b3480ce2d008867922c0b70f808718f43813305fee07ba2c60fc057f0b3ae7e660425968