Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
818fc8fd60958dd2d68e78901d9ca853.exe
Resource
win7-20231129-en
General
-
Target
818fc8fd60958dd2d68e78901d9ca853.exe
-
Size
3.1MB
-
MD5
818fc8fd60958dd2d68e78901d9ca853
-
SHA1
f030dc87346b8ba067cfcbf2cd65a4ce5b6c4ccb
-
SHA256
8be6f3a09608b6d9243c599e2e8fa46e8fc81b341ba7b02c84aad2e7d2e0dac2
-
SHA512
68e52959162505709f2037a98e725ee29cb8c2e46fb76715b777fc6d96b62c53171db938191eb3a211567702330c23732dc616a1403034b853e7eb9b6df4e95d
-
SSDEEP
49152:eV8Rh1twb/zOidNeQlRzOcD34FWSj6Vj1DQXNzwGQYYI:9PQzzr86dIL
Malware Config
Extracted
netwire
sacsacsav.com:6060
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
ctMImXHq
-
offline_keylogger
true
-
password
Topgangz1.
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2996-26-0x00000000047A0000-0x00000000047DE000-memory.dmp netwire behavioral1/memory/2416-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2416-28-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2416-34-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svchost.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2996 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 818fc8fd60958dd2d68e78901d9ca853.exe 2996 ipconfig.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2996 ipconfig.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2548 wrote to memory of 2996 2548 818fc8fd60958dd2d68e78901d9ca853.exe 29 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32 PID 2996 wrote to memory of 2416 2996 ipconfig.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\818fc8fd60958dd2d68e78901d9ca853.exe"C:\Users\Admin\AppData\Local\Temp\818fc8fd60958dd2d68e78901d9ca853.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Drops file in Windows directory
PID:2416
-
-