Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
42490f9237fa30051acbda579f983bfc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42490f9237fa30051acbda579f983bfc.exe
Resource
win10v2004-20231215-en
General
-
Target
42490f9237fa30051acbda579f983bfc.exe
-
Size
1.8MB
-
MD5
42490f9237fa30051acbda579f983bfc
-
SHA1
2ec5633ee543bec37f50ae0c74bb3470f4865e41
-
SHA256
deb81ddd886fad1e97436e3ce147dc6d86d00dee10571d0c0e474c1aa11031e3
-
SHA512
9d8cb0a3fb6b2926b0a6c13cd2a5cca432707376c4a86a9bd060a563b3480ce2d008867922c0b70f808718f43813305fee07ba2c60fc057f0b3ae7e660425968
-
SSDEEP
49152:xhtORUwc166NlRq7vLSUtwt4wv0WroWFeZkP9aiK+d:xhtORUB166NHq7vLZc1cWBFeZkP9aiKC
Malware Config
Extracted
netwire
soludada.ddns.net:1984
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
darf
-
install_path
%AppData%\darf\darf.exe
-
keylogger_dir
%AppData%\darf\
-
lock_executable
true
-
mutex
fYIqDmQC
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
darf
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/976-1-0x00000000007D0000-0x00000000007EE000-memory.dmp netwire behavioral2/memory/976-3-0x00000000007F0000-0x0000000000818000-memory.dmp netwire behavioral2/memory/2132-15-0x0000000002090000-0x00000000020B8000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 42490f9237fa30051acbda579f983bfc.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 darf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\darf = "C:\\Users\\Admin\\AppData\\Roaming\\darf\\darf.exe" darf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 2132 976 42490f9237fa30051acbda579f983bfc.exe 92 PID 976 wrote to memory of 2132 976 42490f9237fa30051acbda579f983bfc.exe 92 PID 976 wrote to memory of 2132 976 42490f9237fa30051acbda579f983bfc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe"C:\Users\Admin\AppData\Local\Temp\42490f9237fa30051acbda579f983bfc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\darf\darf.exe"C:\Users\Admin\AppData\Roaming\darf\darf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5b0b96f3585c09c7451a73f8ffa343650
SHA1be4e11861cf06176de68a8e262ba7146c0df0de7
SHA256745b24b125c2181462de9c45d511af1c3974fb9c5a8d2c79d505a30c54ff1140
SHA51206f4b57f4c1037b186aa24af77ef3759e99c93d2b674762c71b6c2ebba0bb8b4fd00447e5b00a5d8db06730218695e19072156e33130bcec33121cfdcbfc1827
-
Filesize
136KB
MD56b66ca2168117f20de83b716a53042f1
SHA187335c4d4821bbf6b2bc63b3cb4333e5e822f1ef
SHA256bfbbd108ef1fd7c0d2622439e450c7fb8a80a2496b4b849ab44edb0e1d5f196a
SHA5124d5ca2df154d7663433778aa90c8322314596a677d5f97a54ba051239b534e1d6864b42a1cfcc4aa8483448591a9e7ecdcd61dc6b27501dd592294d059973cd7
-
Filesize
27KB
MD52734481a87fae172fa0a1d1609450c8a
SHA183caa4f74abf6055866c2ded57d079c41c8f863b
SHA2565bcef33b9f042ce521cbe9842cb271f548db996fa6c8996d08177de9147c96cd
SHA51232920d97a46a35fa4ee4c3856652fd28bcb8f0d44c5177076ff24f221845a1b3460bc75bec0205bfcc536e0171d80190519cf272d82bc2776107735bce26fa45