Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
45a2a1132f0ca00d94d8ed9ab573b3a9.exe
Resource
win7-20231215-en
General
-
Target
45a2a1132f0ca00d94d8ed9ab573b3a9.exe
-
Size
743KB
-
MD5
45a2a1132f0ca00d94d8ed9ab573b3a9
-
SHA1
ca4945e49e14b502f18799434d71a50c814458ef
-
SHA256
e502fcf4ae5b5af00d0d58b55295cff685f473f8d57e750bfde618161d3ba006
-
SHA512
529a8dc9ce3dd146f4274838a3ab6398816efc0290ca95fa1ce6ccab70e20fbec15e235db007088d87e89b52893abf87056c8b8e6c2dd3cc108c1c524a0a9f0a
-
SSDEEP
12288:ON5RoPcUFPG/U1Y6JUGxsB9j3pe8RqKmv31WV:ONfoUUFPGc1YFGSXbpZqnv31o
Malware Config
Extracted
netwire
harold.ns01.info:3606
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
prim
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
eApkLVIW
-
offline_keylogger
true
-
password
master12
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2176-21-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-24-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-22-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-31-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-29-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2176-19-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1532-61-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1532-60-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1532-63-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
pid Process 268 Host.exe 576 Host.exe 1532 Host.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 45a2a1132f0ca00d94d8ed9ab573b3a9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2808 set thread context of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 268 set thread context of 1532 268 Host.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1636 schtasks.exe 2620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 268 Host.exe 268 Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe Token: SeDebugPrivilege 268 Host.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2620 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 35 PID 2808 wrote to memory of 2620 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 35 PID 2808 wrote to memory of 2620 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 35 PID 2808 wrote to memory of 2620 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 35 PID 2808 wrote to memory of 2204 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 33 PID 2808 wrote to memory of 2204 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 33 PID 2808 wrote to memory of 2204 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 33 PID 2808 wrote to memory of 2204 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 33 PID 2808 wrote to memory of 3032 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 32 PID 2808 wrote to memory of 3032 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 32 PID 2808 wrote to memory of 3032 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 32 PID 2808 wrote to memory of 3032 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 32 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2808 wrote to memory of 2176 2808 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 31 PID 2176 wrote to memory of 268 2176 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 30 PID 2176 wrote to memory of 268 2176 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 30 PID 2176 wrote to memory of 268 2176 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 30 PID 2176 wrote to memory of 268 2176 45a2a1132f0ca00d94d8ed9ab573b3a9.exe 30 PID 268 wrote to memory of 1636 268 Host.exe 39 PID 268 wrote to memory of 1636 268 Host.exe 39 PID 268 wrote to memory of 1636 268 Host.exe 39 PID 268 wrote to memory of 1636 268 Host.exe 39 PID 268 wrote to memory of 576 268 Host.exe 38 PID 268 wrote to memory of 576 268 Host.exe 38 PID 268 wrote to memory of 576 268 Host.exe 38 PID 268 wrote to memory of 576 268 Host.exe 38 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36 PID 268 wrote to memory of 1532 268 Host.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"2⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"C:\Users\Admin\AppData\Local\Temp\45a2a1132f0ca00d94d8ed9ab573b3a9.exe"2⤵PID:2204
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HntulBWtPp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF4EA.tmp"2⤵
- Creates scheduled task(s)
PID:2620
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
PID:576
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HntulBWtPp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp94E0.tmp"2⤵
- Creates scheduled task(s)
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57995a8054cdf8254e1b401b3e1253e27
SHA1c5d7495015ea0aecdad7c52ff1a884cc990b8193
SHA256b6d919ebf4c9ea7449383be6aacf2922a198047ac85cac579ff8db541d5aab13
SHA5122f9e2e804e2e0b4e0c21f35330f235e6f398822c904e5dc80952a1249014f8fcc1c57f99a9b2048003478f9316c2b7281f801a63dbb998ef623475f370e538f5
-
Filesize
33KB
MD5650fa3703188f66e8ce7babc7daae904
SHA12c268e97133e78ca40f88d8de1522bf3386e72d8
SHA2563e63f9e60986671c79ff4069423e66a507a630cbaa008ff025d38623906cff01
SHA512a2dc428baf665de6d07a9e30fd2b31d68e141d6685c7117de89a683e4b98dbed77d424633b352ce1007e47d53d9175c445af5ff3daf0fb84d3b051ff69da72b3