Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 10:29

General

  • Target

    45a2a1132f0ca00d94d8ed9ab573b3a9.exe

  • Size

    743KB

  • MD5

    45a2a1132f0ca00d94d8ed9ab573b3a9

  • SHA1

    ca4945e49e14b502f18799434d71a50c814458ef

  • SHA256

    e502fcf4ae5b5af00d0d58b55295cff685f473f8d57e750bfde618161d3ba006

  • SHA512

    529a8dc9ce3dd146f4274838a3ab6398816efc0290ca95fa1ce6ccab70e20fbec15e235db007088d87e89b52893abf87056c8b8e6c2dd3cc108c1c524a0a9f0a

  • SSDEEP

    12288:ON5RoPcUFPG/U1Y6JUGxsB9j3pe8RqKmv31WV:ONfoUUFPGc1YFGSXbpZqnv31o

Malware Config

Extracted

Family

netwire

C2

harold.ns01.info:3606

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    prim

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    eApkLVIW

  • offline_keylogger

    true

  • password

    master12

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 10 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe
    "C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe
      "C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2176
    • C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe
      "C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"
      2⤵
        PID:3032
      • C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe
        "C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"
        2⤵
          PID:2204
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HntulBWtPp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF4EA.tmp"
          2⤵
          • Creates scheduled task(s)
          PID:2620
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          2⤵
          • Executes dropped EXE
          PID:1532
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          2⤵
          • Executes dropped EXE
          PID:576
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HntulBWtPp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp94E0.tmp"
          2⤵
          • Creates scheduled task(s)
          PID:1636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        92KB

        MD5

        7995a8054cdf8254e1b401b3e1253e27

        SHA1

        c5d7495015ea0aecdad7c52ff1a884cc990b8193

        SHA256

        b6d919ebf4c9ea7449383be6aacf2922a198047ac85cac579ff8db541d5aab13

        SHA512

        2f9e2e804e2e0b4e0c21f35330f235e6f398822c904e5dc80952a1249014f8fcc1c57f99a9b2048003478f9316c2b7281f801a63dbb998ef623475f370e538f5

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        33KB

        MD5

        650fa3703188f66e8ce7babc7daae904

        SHA1

        2c268e97133e78ca40f88d8de1522bf3386e72d8

        SHA256

        3e63f9e60986671c79ff4069423e66a507a630cbaa008ff025d38623906cff01

        SHA512

        a2dc428baf665de6d07a9e30fd2b31d68e141d6685c7117de89a683e4b98dbed77d424633b352ce1007e47d53d9175c445af5ff3daf0fb84d3b051ff69da72b3

      • memory/268-43-0x0000000004850000-0x0000000004890000-memory.dmp

        Filesize

        256KB

      • memory/268-40-0x0000000074610000-0x0000000074CFE000-memory.dmp

        Filesize

        6.9MB

      • memory/268-41-0x0000000004850000-0x0000000004890000-memory.dmp

        Filesize

        256KB

      • memory/268-39-0x00000000011B0000-0x0000000001270000-memory.dmp

        Filesize

        768KB

      • memory/268-42-0x0000000074610000-0x0000000074CFE000-memory.dmp

        Filesize

        6.9MB

      • memory/268-62-0x0000000074610000-0x0000000074CFE000-memory.dmp

        Filesize

        6.9MB

      • memory/268-44-0x0000000004E20000-0x0000000004E82000-memory.dmp

        Filesize

        392KB

      • memory/1532-55-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1532-61-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1532-60-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1532-63-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-21-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-27-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-29-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-19-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-17-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-31-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-22-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-24-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-15-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-13-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2176-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2808-32-0x0000000074660000-0x0000000074D4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2808-0-0x0000000000BE0000-0x0000000000CA0000-memory.dmp

        Filesize

        768KB

      • memory/2808-7-0x00000000020A0000-0x00000000020D0000-memory.dmp

        Filesize

        192KB

      • memory/2808-6-0x0000000004970000-0x00000000049D2000-memory.dmp

        Filesize

        392KB

      • memory/2808-5-0x0000000004930000-0x0000000004970000-memory.dmp

        Filesize

        256KB

      • memory/2808-4-0x0000000074660000-0x0000000074D4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2808-3-0x0000000000550000-0x000000000056C000-memory.dmp

        Filesize

        112KB

      • memory/2808-2-0x0000000004930000-0x0000000004970000-memory.dmp

        Filesize

        256KB

      • memory/2808-1-0x0000000074660000-0x0000000074D4E000-memory.dmp

        Filesize

        6.9MB