Analysis
-
max time kernel
0s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:52
Behavioral task
behavioral1
Sample
28eb29aabfe6c68511909945bd976616.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
28eb29aabfe6c68511909945bd976616.exe
-
Size
598KB
-
MD5
28eb29aabfe6c68511909945bd976616
-
SHA1
9c5d926e524ede76bb2dd6036b303200913f951d
-
SHA256
8a26342451ab7905a025df6591bb15c0cae7fbb80267370df236e40286ee6d93
-
SHA512
d1c9ba8e2300db7c5b6c75d769360bab8e8e87cfe71f17e31c574a71b36c8f2b00385b3e1f2bfc1263c0293db2f09e4f8594759a0bc7ff934b5bf5b1cbf26a7e
-
SSDEEP
12288:rJz0TrCqVM8UoAs4fg4xbFs9lLaAgev1pS4aCkFdqri9VWQMkbx/yMFqNfuw:FirCkUo8fLBqmze9pS4a7qu9VdMkbIM8
Malware Config
Extracted
Family
netwire
C2
automan.duckdns.org:3382
Attributes
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2984-13-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/2392-15-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/2392-16-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2984 test.exe -
resource yara_rule behavioral2/memory/3316-0-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral2/memory/3316-14-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2380 3316 28eb29aabfe6c68511909945bd976616.exe 18 PID 3316 wrote to memory of 2380 3316 28eb29aabfe6c68511909945bd976616.exe 18 PID 3316 wrote to memory of 2380 3316 28eb29aabfe6c68511909945bd976616.exe 18 PID 2380 wrote to memory of 2984 2380 cmd.exe 20 PID 2380 wrote to memory of 2984 2380 cmd.exe 20 PID 2380 wrote to memory of 2984 2380 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\28eb29aabfe6c68511909945bd976616.exe"C:\Users\Admin\AppData\Local\Temp\28eb29aabfe6c68511909945bd976616.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵PID:2392
-
-
-