Analysis
-
max time kernel
2s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 22:40
Behavioral task
behavioral1
Sample
afa6ee26525b6fee62f56ce402e9bee4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afa6ee26525b6fee62f56ce402e9bee4.exe
Resource
win10v2004-20240226-en
General
-
Target
afa6ee26525b6fee62f56ce402e9bee4.exe
-
Size
127KB
-
MD5
afa6ee26525b6fee62f56ce402e9bee4
-
SHA1
ef9c5e750f6033d579444da50bd764802f868fa4
-
SHA256
8b614881cf8d45f1bd8174823910999453c7a45ee02fab71b4ec4125563a3229
-
SHA512
aa35394f89f02c77e87c07881945d66aad08e407f8405202fe957ea5e50d73d7786ccfaccdfd8e245c76b5f76fe770f98f14e8cc39ae5399287e27bb7b887230
-
SSDEEP
3072:mY3E2BfBSbEsz7nCAFVNNvBGvdO5gPaEjep8Fe7Z1iO7ZbvbfV7u:JRBfBSosz7nCA3NHCdXaEj7Fe7Z1iOFs
Malware Config
Extracted
netwire
automan.duckdns.org:3382
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
HDPAYslj
-
offline_keylogger
true
-
password
onelove82
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x00080000000231f3-4.dat netwire behavioral2/memory/2404-8-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation afa6ee26525b6fee62f56ce402e9bee4.exe -
Executes dropped EXE 1 IoCs
pid Process 3776 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3776 2404 afa6ee26525b6fee62f56ce402e9bee4.exe 89 PID 2404 wrote to memory of 3776 2404 afa6ee26525b6fee62f56ce402e9bee4.exe 89 PID 2404 wrote to memory of 3776 2404 afa6ee26525b6fee62f56ce402e9bee4.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa6ee26525b6fee62f56ce402e9bee4.exe"C:\Users\Admin\AppData\Local\Temp\afa6ee26525b6fee62f56ce402e9bee4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5afa6ee26525b6fee62f56ce402e9bee4
SHA1ef9c5e750f6033d579444da50bd764802f868fa4
SHA2568b614881cf8d45f1bd8174823910999453c7a45ee02fab71b4ec4125563a3229
SHA512aa35394f89f02c77e87c07881945d66aad08e407f8405202fe957ea5e50d73d7786ccfaccdfd8e245c76b5f76fe770f98f14e8cc39ae5399287e27bb7b887230