Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:52
Behavioral task
behavioral1
Sample
28eb29aabfe6c68511909945bd976616.exe
Resource
win7-20231215-en
General
-
Target
28eb29aabfe6c68511909945bd976616.exe
-
Size
598KB
-
MD5
28eb29aabfe6c68511909945bd976616
-
SHA1
9c5d926e524ede76bb2dd6036b303200913f951d
-
SHA256
8a26342451ab7905a025df6591bb15c0cae7fbb80267370df236e40286ee6d93
-
SHA512
d1c9ba8e2300db7c5b6c75d769360bab8e8e87cfe71f17e31c574a71b36c8f2b00385b3e1f2bfc1263c0293db2f09e4f8594759a0bc7ff934b5bf5b1cbf26a7e
-
SSDEEP
12288:rJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuw:FirCkUo8fLBqmze9pS4a7qu9VdMkbIM8
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 10 IoCs
resource yara_rule behavioral1/files/0x0008000000012233-2.dat netwire behavioral1/memory/1292-14-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-17-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-18-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-19-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-20-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-24-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-28-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-29-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/3004-30-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 1292 test.exe 3004 Host.exe -
Loads dropped DLL 4 IoCs
pid Process 2468 cmd.exe 2468 cmd.exe 1292 test.exe 1292 test.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2096-16-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2468 2096 28eb29aabfe6c68511909945bd976616.exe 29 PID 2096 wrote to memory of 2468 2096 28eb29aabfe6c68511909945bd976616.exe 29 PID 2096 wrote to memory of 2468 2096 28eb29aabfe6c68511909945bd976616.exe 29 PID 2096 wrote to memory of 2468 2096 28eb29aabfe6c68511909945bd976616.exe 29 PID 2468 wrote to memory of 1292 2468 cmd.exe 30 PID 2468 wrote to memory of 1292 2468 cmd.exe 30 PID 2468 wrote to memory of 1292 2468 cmd.exe 30 PID 2468 wrote to memory of 1292 2468 cmd.exe 30 PID 1292 wrote to memory of 3004 1292 test.exe 31 PID 1292 wrote to memory of 3004 1292 test.exe 31 PID 1292 wrote to memory of 3004 1292 test.exe 31 PID 1292 wrote to memory of 3004 1292 test.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\28eb29aabfe6c68511909945bd976616.exe"C:\Users\Admin\AppData\Local\Temp\28eb29aabfe6c68511909945bd976616.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5947c706540a4f3083fc09dbbd20aa0d7
SHA1b1add7d17a38b1d0e906ad86f034c6528bb371af
SHA256d5e61bdd7736038993c3762a6a2192b2730a44562bde045fa95ba9e45525bc3c
SHA512df794541bd7fe99058f5de6dd7e4e158a657aae31d00d464718f836a07f6a9af36b073a312586bfa7d4ad672c4fd58c6644b788eeb5fd20496d398383c1d7e23