Analysis
-
max time kernel
9s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
cb8689a8c6988aa80c7a79c6353158eb.exe
Resource
win7-20231129-en
General
-
Target
cb8689a8c6988aa80c7a79c6353158eb.exe
-
Size
4.3MB
-
MD5
cb8689a8c6988aa80c7a79c6353158eb
-
SHA1
677d9c639f10a6664c33006c94ef5ce2191d762f
-
SHA256
c58771ee917e04657e83a23e53305b8c311a143791bf16e8542fb692665c5047
-
SHA512
d15a3324eaefe93070b54584cbb22eaea1a5d364e2db8c651cd47c983ccd63db551209cbc5cee98b67dd59b366a6c85ab1cc10ad68b5fc4e0373d849017872d0
-
SSDEEP
98304:s2cPK8eAz79BY9t7SLs2pYnKwr6HReEYPiHxwKAqkPq:3CKmBYj7P2KK2qbYKHqKAdi
Malware Config
Extracted
netwire
clients.enigmasolutions.xyz:54573
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Cleint-%Rand%
-
install_path
%AppData%\Microsoft\Crypto\fers.exe
-
keylogger_dir
%AppData%\msr\
-
lock_executable
false
-
offline_keylogger
true
-
password
\tx>N(6H`Om2k/cWJBp,""bUbAd1-0Mg
-
registry_autorun
true
-
startup_name
fers
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral2/memory/4284-11-0x0000000004560000-0x00000000045C6000-memory.dmp netwire behavioral2/memory/2424-16-0x0000000000910000-0x0000000000940000-memory.dmp netwire behavioral2/memory/4284-20-0x0000000004560000-0x00000000045C6000-memory.dmp netwire behavioral2/memory/2424-18-0x0000000000910000-0x0000000000940000-memory.dmp netwire behavioral2/memory/2424-14-0x0000000000910000-0x0000000000940000-memory.dmp netwire behavioral2/memory/4284-12-0x0000000004560000-0x00000000045C6000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4284 set thread context of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96 PID 4284 wrote to memory of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96 PID 4284 wrote to memory of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96 PID 4284 wrote to memory of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96 PID 4284 wrote to memory of 2424 4284 cb8689a8c6988aa80c7a79c6353158eb.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb8689a8c6988aa80c7a79c6353158eb.exe"C:\Users\Admin\AppData\Local\Temp\cb8689a8c6988aa80c7a79c6353158eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\cb8689a8c6988aa80c7a79c6353158eb.exeC:\Users\Admin\AppData\Local\Temp\cb8689a8c6988aa80c7a79c6353158eb.exe2⤵PID:2424
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\fers.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\fers.exe"3⤵PID:2180
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\fers.exeC:\Users\Admin\AppData\Roaming\Microsoft\Crypto\fers.exe4⤵PID:4324
-
-
-