Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
a7c3d0d7bf75bb2e25b78cebab270fb6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7c3d0d7bf75bb2e25b78cebab270fb6.exe
Resource
win10v2004-20240226-en
General
-
Target
a7c3d0d7bf75bb2e25b78cebab270fb6.exe
-
Size
123KB
-
MD5
a7c3d0d7bf75bb2e25b78cebab270fb6
-
SHA1
8742ac04ab6ac6c89a2fa13b2c17d18055c33769
-
SHA256
13373ecd91432ffad9d13dc85c3614a19cbd57fc576bd968f0204ef1305b39cf
-
SHA512
f37a578053a697196a1e0d397d87bbd118b605976747222fd33a7f30ec4e63c9fb7ad48a137c3c475bf091ccb5b13144a0951bf9dc976f021e6db69ac639e86e
-
SSDEEP
3072:/4JmjzYxGn7iF4s3ft5UZmgI7Dgxess5lFE:AJmjzYx3QZm/pg
Malware Config
Extracted
netwire
vbc.publicvm.com:1002
-
activex_autorun
true
-
activex_key
{TQ754744-WA00-XI0Y-FV50-NS8J107AI1YU}
-
copy_executable
false
-
delete_original
false
-
host_id
BetaBot
-
keylogger_dir
%AppData%\Windows\
-
lock_executable
true
-
mutex
GoNTDjNn
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Chrome
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/548-129-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/548-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TQ754744-WA00-XI0Y-FV50-NS8J107AI1YU} a7c3d0d7bf75bb2e25b78cebab270fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TQ754744-WA00-XI0Y-FV50-NS8J107AI1YU}\StubPath = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a7c3d0d7bf75bb2e25b78cebab270fb6.exe\"" a7c3d0d7bf75bb2e25b78cebab270fb6.exe -
Executes dropped EXE 1 IoCs
pid Process 548 a7c3d0d7bf75bb2e25b78cebab270fb6.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7c3d0d7bf75bb2e25b78cebab270fb6.exe" a7c3d0d7bf75bb2e25b78cebab270fb6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28 PID 2180 wrote to memory of 548 2180 a7c3d0d7bf75bb2e25b78cebab270fb6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7c3d0d7bf75bb2e25b78cebab270fb6.exe"C:\Users\Admin\AppData\Local\Temp\a7c3d0d7bf75bb2e25b78cebab270fb6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\a7c3d0d7bf75bb2e25b78cebab270fb6.exe"C:\Users\Admin\AppData\Local\Temp\a7c3d0d7bf75bb2e25b78cebab270fb6.exe"2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
PID:548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5a7c3d0d7bf75bb2e25b78cebab270fb6
SHA18742ac04ab6ac6c89a2fa13b2c17d18055c33769
SHA25613373ecd91432ffad9d13dc85c3614a19cbd57fc576bd968f0204ef1305b39cf
SHA512f37a578053a697196a1e0d397d87bbd118b605976747222fd33a7f30ec4e63c9fb7ad48a137c3c475bf091ccb5b13144a0951bf9dc976f021e6db69ac639e86e