Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
5c1a933f916891911ab6d69a65d0d855.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c1a933f916891911ab6d69a65d0d855.exe
Resource
win10v2004-20231215-en
General
-
Target
5c1a933f916891911ab6d69a65d0d855.exe
-
Size
576KB
-
MD5
5c1a933f916891911ab6d69a65d0d855
-
SHA1
37aa46c9b8d8e9475d6029d57be31f47409d4726
-
SHA256
82137775a74b4ee9456e1fc73e4dc89f78d25dee1c4d3990df95570124ad439b
-
SHA512
2f3b63ef9341d467ed6e4c76152460620ec92a2996881f6f8f6cc6660ddcfa3bca66fd07d6a76dd0cea5210327c5a875442e7e295e7bd474ead7c148538aac8b
-
SSDEEP
12288:Irf0P3HD5Y+nvGtCsA/Rm2UGWGMqY2u3WUmVKeWe:XP3H1YEvzAAcW7KeF
Malware Config
Extracted
netwire
warin.hopto.org:4320
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2996-2-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2996-5-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2996-6-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2996-7-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1272 set thread context of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1272 5c1a933f916891911ab6d69a65d0d855.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28 PID 1272 wrote to memory of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28 PID 1272 wrote to memory of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28 PID 1272 wrote to memory of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28 PID 1272 wrote to memory of 2996 1272 5c1a933f916891911ab6d69a65d0d855.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c1a933f916891911ab6d69a65d0d855.exe"C:\Users\Admin\AppData\Local\Temp\5c1a933f916891911ab6d69a65d0d855.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\5c1a933f916891911ab6d69a65d0d855.exe"C:\Users\Admin\AppData\Local\Temp\5c1a933f916891911ab6d69a65d0d855.exe"2⤵PID:2996
-