Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
53b5306d77c1b44d375ebca82dd680ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53b5306d77c1b44d375ebca82dd680ce.exe
Resource
win10v2004-20231215-en
General
-
Target
53b5306d77c1b44d375ebca82dd680ce.exe
-
Size
3.1MB
-
MD5
53b5306d77c1b44d375ebca82dd680ce
-
SHA1
49ecb91d93136097f0cf9b6691effdf6fe4b755c
-
SHA256
7654eb53d495fab9d93ca0d1deb92538536c3fb8a01619615328ae70d365243c
-
SHA512
1e5baf3f7d892fb7ef1abe9ddf6bc28c039c764c730e3837bea57719579f507eff965688efc6cbdc74259640cb5f500102f51111dda5a434e5f01686babcc8e3
-
SSDEEP
49152:ch+ZkldoPK8YaYT6Ce9IwaCVV6GGMSqBhjwjHsNaw1kFe0wrkKqFKyqgUqvxu1yQ:N2cPK8hIwaeV6GG9iawuFB6NDglk1P
Malware Config
Extracted
netwire
clients.enigmasolutions.xyz:54573
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Cleint-%Rand%
-
install_path
%AppData%\Microsoft\Speech\eurj.exe
-
keylogger_dir
%AppData%\msr\
-
lock_executable
false
-
offline_keylogger
true
-
password
\tx>N(6H`Om2k/cWJBp,""bUbAd1-0Mg
-
registry_autorun
true
-
startup_name
eurj
-
use_mutex
false
Signatures
-
NetWire RAT payload 12 IoCs
resource yara_rule behavioral1/memory/2336-10-0x00000000005D0000-0x0000000000636000-memory.dmp netwire behavioral1/memory/2336-13-0x00000000005D0000-0x0000000000636000-memory.dmp netwire behavioral1/memory/2656-27-0x00000000004C0000-0x00000000004F0000-memory.dmp netwire behavioral1/memory/2336-31-0x00000000005D0000-0x0000000000636000-memory.dmp netwire behavioral1/memory/2656-33-0x00000000004C0000-0x00000000004F0000-memory.dmp netwire behavioral1/memory/2656-29-0x00000000004C0000-0x00000000004F0000-memory.dmp netwire behavioral1/memory/2676-55-0x0000000000F90000-0x0000000000FF6000-memory.dmp netwire behavioral1/memory/2464-69-0x00000000003B0000-0x00000000003E0000-memory.dmp netwire behavioral1/memory/2464-72-0x00000000003B0000-0x00000000003E0000-memory.dmp netwire behavioral1/memory/2676-74-0x0000000000F90000-0x0000000000FF6000-memory.dmp netwire behavioral1/memory/2464-75-0x00000000003B0000-0x00000000003E0000-memory.dmp netwire behavioral1/memory/2464-76-0x00000000003B0000-0x00000000003E0000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2676 eurj.exe 2464 eurj.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 53b5306d77c1b44d375ebca82dd680ce.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\eurj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Speech\\eurj.exe" eurj.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0038000000016d1e-38.dat autoit_exe behavioral1/files/0x0038000000016d1e-39.dat autoit_exe behavioral1/files/0x0038000000016d1e-35.dat autoit_exe behavioral1/files/0x0038000000016d1e-70.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2336 set thread context of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2676 set thread context of 2464 2676 eurj.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2336 wrote to memory of 2656 2336 53b5306d77c1b44d375ebca82dd680ce.exe 28 PID 2656 wrote to memory of 2676 2656 53b5306d77c1b44d375ebca82dd680ce.exe 29 PID 2656 wrote to memory of 2676 2656 53b5306d77c1b44d375ebca82dd680ce.exe 29 PID 2656 wrote to memory of 2676 2656 53b5306d77c1b44d375ebca82dd680ce.exe 29 PID 2656 wrote to memory of 2676 2656 53b5306d77c1b44d375ebca82dd680ce.exe 29 PID 2676 wrote to memory of 2464 2676 eurj.exe 32 PID 2676 wrote to memory of 2464 2676 eurj.exe 32 PID 2676 wrote to memory of 2464 2676 eurj.exe 32 PID 2676 wrote to memory of 2464 2676 eurj.exe 32 PID 2676 wrote to memory of 2464 2676 eurj.exe 32 PID 2676 wrote to memory of 2464 2676 eurj.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b5306d77c1b44d375ebca82dd680ce.exe"C:\Users\Admin\AppData\Local\Temp\53b5306d77c1b44d375ebca82dd680ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\53b5306d77c1b44d375ebca82dd680ce.exeC:\Users\Admin\AppData\Local\Temp\53b5306d77c1b44d375ebca82dd680ce.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\eurj.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\eurj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\eurj.exeC:\Users\Admin\AppData\Roaming\Microsoft\Speech\eurj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD53d15062b7fa05e29bb011e00ebc611df
SHA114353a0050e4cdc7230a25a0209a0e3a8f5829e0
SHA25691263f8d46791e011583234a8b1d5e41acc036cfddc4d60e26607589884a7e62
SHA512d97ec08113ed4e190381e09ea91c9a2951cc4fd062837683d775e85e5b3c2ee445829845bdf12dbe49de2833fb154fc466578d17769df4b3075d8b964205a825
-
Filesize
48KB
MD54b5a3d62fe5540c53d526a56f1af1807
SHA1ab094a4f9d43ee50f9c7be7760519a26e94db92d
SHA256aaa247a0bb996cb5414dbc5943a68c12f84ea06f44ce1f327910ae96416e6b67
SHA512316d13097ab14b9d114a8624dc46c217c1dfff7bda804a8df63a42bf1fd20a53af2ba2e995ea6e936028acaf8d68a44f914482543598cd866312c9fc5a8e503e
-
Filesize
3.1MB
MD553b5306d77c1b44d375ebca82dd680ce
SHA149ecb91d93136097f0cf9b6691effdf6fe4b755c
SHA2567654eb53d495fab9d93ca0d1deb92538536c3fb8a01619615328ae70d365243c
SHA5121e5baf3f7d892fb7ef1abe9ddf6bc28c039c764c730e3837bea57719579f507eff965688efc6cbdc74259640cb5f500102f51111dda5a434e5f01686babcc8e3
-
Filesize
49KB
MD52314d54783698707601c1844eba335e9
SHA127a0854f7fd8da395fec86f0a8255fcb8389710e
SHA2562831eebb226d7e5a9fc10c626baa925115a0c968f36140dc71707fddea98d2d0
SHA5123b4036a54310165561e8c4653ec3a0fbf05140b3a7abf42e21eaa8810208249ac15cb26c4c21966285b11482b8baeb65d716dec6173f31586876496d3826a149
-
Filesize
395KB
MD5091a530232f00ea62bc43aa1da1c7b10
SHA1d71e651ad0bc568635ecce003a9430c60ff3938d
SHA256be229a2a73cb4af85447dd79d25922dd0954cbbe05d60e671f723bdc03cb56de
SHA51267d33486340e9044ef72404e75221f0ba646d5eda6783124a3fe94ee83548228e903f8c7fe6334eef41c41fb212b90360450985cd0dc9f462fc2abe2dda3c66d
-
Filesize
58KB
MD513caa20fd41cda20d36339769d26ff16
SHA17fb3b9a1b991ec568435f8e6f3edf36f9f8df07a
SHA2562d5c4c122a202229a2d59f5783ec8d062662640184254aa4f2b2f394b4e0f985
SHA51281e39210eea4ab3e00dc01db30779345c57fbb8982c10ccd56fc391b610d9b17649838f5a41a81e2af283f656bf1f10f0c602afac3800d64ca843df463a97f1e