Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
3aece3473d0dc78b33efce273ac23626.exe
Resource
win7-20231215-en
General
-
Target
3aece3473d0dc78b33efce273ac23626.exe
-
Size
1.2MB
-
MD5
3aece3473d0dc78b33efce273ac23626
-
SHA1
64b35b31e90f6d569df2195f312f31d0d499a971
-
SHA256
ddb36550d76aab46cf84a855f0e242d45a7fa4576f1b162fcf41026defecdc3d
-
SHA512
77e81bf73fd795c9ece63b1eb8d0021bfaee3b6ac64d6cbe5a758e69666969b26451958622e9a2ac1fe00f4f907f2d69238c8b1cfa6cd5887e6bc83cff7d9284
-
SSDEEP
24576:1AOcZu3wPvjWH0+74RZ5bM3+vT9TFsXc6z1F/iI:/NGjx+8m3uT9TWM6z1F/D
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Netwir
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
pHJVBoFH
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2968-77-0x00000000003F0000-0x0000000000981000-memory.dmp netwire behavioral1/memory/2968-79-0x00000000003F0000-0x0000000000981000-memory.dmp netwire behavioral1/memory/2968-80-0x00000000003F0000-0x0000000000981000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2672 icvsbsh.pif -
Loads dropped DLL 4 IoCs
pid Process 2252 3aece3473d0dc78b33efce273ac23626.exe 2252 3aece3473d0dc78b33efce273ac23626.exe 2252 3aece3473d0dc78b33efce273ac23626.exe 2252 3aece3473d0dc78b33efce273ac23626.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\11195509\\icvsbsh.pif C:\\Users\\Admin\\AppData\\Roaming\\11195509\\moeebd.wrc" icvsbsh.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2968 2672 icvsbsh.pif 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2672 2252 3aece3473d0dc78b33efce273ac23626.exe 28 PID 2252 wrote to memory of 2672 2252 3aece3473d0dc78b33efce273ac23626.exe 28 PID 2252 wrote to memory of 2672 2252 3aece3473d0dc78b33efce273ac23626.exe 28 PID 2252 wrote to memory of 2672 2252 3aece3473d0dc78b33efce273ac23626.exe 28 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31 PID 2672 wrote to memory of 2968 2672 icvsbsh.pif 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aece3473d0dc78b33efce273ac23626.exe"C:\Users\Admin\AppData\Local\Temp\3aece3473d0dc78b33efce273ac23626.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\11195509\icvsbsh.pif"C:\Users\Admin\AppData\Roaming\11195509\icvsbsh.pif" moeebd.wrc2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD5a5c843387d16a3c5662ba074146a9627
SHA1f1559cdf65d84b74bcbad8cd6c65952b84ce2141
SHA2564b06b917f60678255c44d2236525fc947bf09200807f49417762a5cbb6ada8b9
SHA512813d86e15b885de3ea9ff79af9fdec11d45482d4491597f9956e2cf344942d37c1999faa9b38dc968a877dc8663c41617fede97ebcbfd11f27ed4a37dfb4afa6
-
Filesize
381KB
MD5a3699593324c486bce63d75c0349acb5
SHA112c738012bdecf3487c685c061c2d39fdad47bd1
SHA2563e2054ba00e358a223f51e8d6eb9864fed1a1e04e5818ec3146f01a4545eb403
SHA512145ab02d66ed688594a5d3ffb3bfd25dbcc67199c6f7b008206489eede39badba1841487b693d32aa796ad154940e2ad0e5819974dac2b9bca1ab690c458625d
-
Filesize
3KB
MD581f715895eaf6cb26d70c02bbf3b3b04
SHA1950ee5ba593cfdf61d0cd25d8a58f0b41da97d5e
SHA256041fc8a754d6843e5620103fbef6f2f4623ea1b36dc3322298c0c0c40b6234eb
SHA5129c14385dfed453b8641712f9a30a76617037458ca8ebdde97455c5fc435e5c969ad8066b96107301934ac9e16fcc18db530f5b66257c8812a671e09990805184
-
Filesize
374KB
MD55d270497c5c172965dfec6b43cc1812a
SHA135f39071e5e735595dbdeda6c4e8ed46971f11d3
SHA2566ce0736631e05712d72b2c0b4d3f85343907cdc02bb389419bf55ad4b8e69f62
SHA5123ab7eda1d5f52274db633df06f1a9cb3a56d519560f819a03533ffb6ce1fb762dd07306e81b13c7da0990649415defd9fb4935775d0c10b71d085be8a7aa5d18
-
Filesize
348KB
MD57dc3391e3459f95795fadadab6660e4a
SHA1875971135edc2855bfe1630bbb37af406fe6bb24
SHA256f486a5e0bc52bf512f5778ea4d0f089af02499f87570508d2d86b7bc96888b19
SHA51289f5d553cad2aaffe78737d19923f8b95b7f8f15b3152c2038e5b00124d4df1a0bcf257ca43f2b46ae920c84ab7649bcb5037c22b7cdfd901f6134e1fbc6e061
-
Filesize
670KB
MD5adfcea78d75201b3e076ad5cd5e03024
SHA1078a991833264fbd26fbe36368a8e5b7d80451fd
SHA2566ca83be643d77af8da636b80200781881cb6c4a9a1ad60d910c65d354478b7db
SHA5124427fb89c0b787fad0c34e2c736938e5b78bfef7f7fb55800d761f1044a2acce6b208fcda5ecd93fe13949acdf74c27bd8ed3df8bc210af65fd896aa246bb9da