Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 01:12

General

  • Target

    42490f9237fa30051acbda579f983bfc.exe

  • Size

    1.8MB

  • MD5

    42490f9237fa30051acbda579f983bfc

  • SHA1

    2ec5633ee543bec37f50ae0c74bb3470f4865e41

  • SHA256

    deb81ddd886fad1e97436e3ce147dc6d86d00dee10571d0c0e474c1aa11031e3

  • SHA512

    9d8cb0a3fb6b2926b0a6c13cd2a5cca432707376c4a86a9bd060a563b3480ce2d008867922c0b70f808718f43813305fee07ba2c60fc057f0b3ae7e660425968

  • SSDEEP

    49152:xhtORUwc166NlRq7vLSUtwt4wv0WroWFeZkP9aiK+d:xhtORUB166NHq7vLZc1cWBFeZkP9aiKC

Malware Config

Extracted

Family

netwire

C2

soludada.ddns.net:1984

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    darf

  • install_path

    %AppData%\darf\darf.exe

  • keylogger_dir

    %AppData%\darf\

  • lock_executable

    true

  • mutex

    fYIqDmQC

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    darf

  • use_mutex

    true

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe
    "C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Roaming\darf\darf.exe
      "C:\Users\Admin\AppData\Roaming\darf\darf.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\darf\darf.exe

    Filesize

    27KB

    MD5

    b0b96f3585c09c7451a73f8ffa343650

    SHA1

    be4e11861cf06176de68a8e262ba7146c0df0de7

    SHA256

    745b24b125c2181462de9c45d511af1c3974fb9c5a8d2c79d505a30c54ff1140

    SHA512

    06f4b57f4c1037b186aa24af77ef3759e99c93d2b674762c71b6c2ebba0bb8b4fd00447e5b00a5d8db06730218695e19072156e33130bcec33121cfdcbfc1827

  • C:\Users\Admin\AppData\Roaming\darf\darf.exe

    Filesize

    136KB

    MD5

    6b66ca2168117f20de83b716a53042f1

    SHA1

    87335c4d4821bbf6b2bc63b3cb4333e5e822f1ef

    SHA256

    bfbbd108ef1fd7c0d2622439e450c7fb8a80a2496b4b849ab44edb0e1d5f196a

    SHA512

    4d5ca2df154d7663433778aa90c8322314596a677d5f97a54ba051239b534e1d6864b42a1cfcc4aa8483448591a9e7ecdcd61dc6b27501dd592294d059973cd7

  • C:\Users\Admin\AppData\Roaming\darf\darf.exe

    Filesize

    27KB

    MD5

    2734481a87fae172fa0a1d1609450c8a

    SHA1

    83caa4f74abf6055866c2ded57d079c41c8f863b

    SHA256

    5bcef33b9f042ce521cbe9842cb271f548db996fa6c8996d08177de9147c96cd

    SHA512

    32920d97a46a35fa4ee4c3856652fd28bcb8f0d44c5177076ff24f221845a1b3460bc75bec0205bfcc536e0171d80190519cf272d82bc2776107735bce26fa45

  • memory/976-0-0x0000000000400000-0x00000000005CA000-memory.dmp

    Filesize

    1.8MB

  • memory/976-1-0x00000000007D0000-0x00000000007EE000-memory.dmp

    Filesize

    120KB

  • memory/976-3-0x00000000007F0000-0x0000000000818000-memory.dmp

    Filesize

    160KB

  • memory/2132-14-0x0000000000400000-0x00000000005CA000-memory.dmp

    Filesize

    1.8MB

  • memory/2132-15-0x0000000002090000-0x00000000020B8000-memory.dmp

    Filesize

    160KB