Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 16:19
Behavioral task
behavioral1
Sample
7d6dd0d2b40f09b5c6667cd2ec1ee893.exe
Resource
win7-20231215-en
General
-
Target
7d6dd0d2b40f09b5c6667cd2ec1ee893.exe
-
Size
588KB
-
MD5
7d6dd0d2b40f09b5c6667cd2ec1ee893
-
SHA1
b46c8b2927fd00188ab6080dd3e31095cb881560
-
SHA256
c3ce61cc74567d43ce8d719516ee9d84930c365a9d183170380bb8ca507ebeb9
-
SHA512
a79c07d7e169e840c12c817964f9140c27a359c416d5c6c522c03186cc7f0a8272ed1e1d83062ab7ac022c478ad805a8ae0267cc9a40a53dd649052de66aed09
-
SSDEEP
12288:DFeHmoZY+PD9dRdIcu2/3Uo979xHQ5dU5K1qJSVLYAlFXZe1x6M1:BeHeWdRycX/U87bQo5IeSJY0BZeWM1
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 15 IoCs
resource yara_rule behavioral2/files/0x0009000000023214-4.dat netwire behavioral2/memory/4680-13-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-15-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-16-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-17-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-18-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-19-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-20-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-21-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-22-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-23-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-24-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-25-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-26-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/516-27-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 2 IoCs
pid Process 4680 test.exe 516 Host.exe -
resource yara_rule behavioral2/memory/5044-0-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral2/memory/5044-14-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2196 5044 7d6dd0d2b40f09b5c6667cd2ec1ee893.exe 85 PID 5044 wrote to memory of 2196 5044 7d6dd0d2b40f09b5c6667cd2ec1ee893.exe 85 PID 5044 wrote to memory of 2196 5044 7d6dd0d2b40f09b5c6667cd2ec1ee893.exe 85 PID 2196 wrote to memory of 4680 2196 cmd.exe 86 PID 2196 wrote to memory of 4680 2196 cmd.exe 86 PID 2196 wrote to memory of 4680 2196 cmd.exe 86 PID 4680 wrote to memory of 516 4680 test.exe 87 PID 4680 wrote to memory of 516 4680 test.exe 87 PID 4680 wrote to memory of 516 4680 test.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d6dd0d2b40f09b5c6667cd2ec1ee893.exe"C:\Users\Admin\AppData\Local\Temp\7d6dd0d2b40f09b5c6667cd2ec1ee893.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5f624c90ef94ca0471613b65c5c030c50
SHA182319e5c1d612e62e6f6069b27ad52179cdd64b5
SHA25638e03022d860e662214e8535bd8024021ea4ae1d5f58991a7bcd1c7a01cd0608
SHA5124fa6a9e51cbcea2a8e02d2efd299a0c159b7899c5803d973bdaf66af354006292e442686c6f8375ced3c734e5c4974000ea6aa7e5f2872712d72c910628617f0