Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/03/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
b0a864a148401a06d36c824e148c4bca.exe
Resource
win7-20240221-en
General
-
Target
b0a864a148401a06d36c824e148c4bca.exe
-
Size
679KB
-
MD5
b0a864a148401a06d36c824e148c4bca
-
SHA1
0f576fd2fa907dd0e44e63dcbae3c95ed02c856e
-
SHA256
a33cee89c7330579833c3ec1708a3718d5383889f83074194b01b0049b985b9c
-
SHA512
c42aaa9a8fe600a55a32a82dd479e83974634bcd1478b7f911561c866e0049e9f7b845c69966865e6197593279e8398ac882251a84f0c65289f544e43a9dbf3f
-
SSDEEP
12288:7ViPLBHrljUrybmbzIpWXPxwKMVAFWuQdvoP8DpBqp9l3SyaUVKnp:7ViP1LlwybOAWfxNrkXgP8svZahp
Malware Config
Extracted
netwire
night90.ddns.net:8999
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
New-stub
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
soHOGwSb
-
offline_keylogger
true
-
password
teamoluwa1
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 7 IoCs
resource yara_rule behavioral1/memory/856-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/856-29-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/856-31-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/856-34-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/628-45-0x0000000001DE0000-0x0000000001E20000-memory.dmp netwire behavioral1/memory/856-42-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/856-46-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2000 powershell.exe 2784 powershell.exe 628 powershell.exe 1504 b0a864a148401a06d36c824e148c4bca.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 1504 b0a864a148401a06d36c824e148c4bca.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2000 1504 b0a864a148401a06d36c824e148c4bca.exe 30 PID 1504 wrote to memory of 2000 1504 b0a864a148401a06d36c824e148c4bca.exe 30 PID 1504 wrote to memory of 2000 1504 b0a864a148401a06d36c824e148c4bca.exe 30 PID 1504 wrote to memory of 2000 1504 b0a864a148401a06d36c824e148c4bca.exe 30 PID 1504 wrote to memory of 2784 1504 b0a864a148401a06d36c824e148c4bca.exe 32 PID 1504 wrote to memory of 2784 1504 b0a864a148401a06d36c824e148c4bca.exe 32 PID 1504 wrote to memory of 2784 1504 b0a864a148401a06d36c824e148c4bca.exe 32 PID 1504 wrote to memory of 2784 1504 b0a864a148401a06d36c824e148c4bca.exe 32 PID 1504 wrote to memory of 2844 1504 b0a864a148401a06d36c824e148c4bca.exe 34 PID 1504 wrote to memory of 2844 1504 b0a864a148401a06d36c824e148c4bca.exe 34 PID 1504 wrote to memory of 2844 1504 b0a864a148401a06d36c824e148c4bca.exe 34 PID 1504 wrote to memory of 2844 1504 b0a864a148401a06d36c824e148c4bca.exe 34 PID 1504 wrote to memory of 628 1504 b0a864a148401a06d36c824e148c4bca.exe 36 PID 1504 wrote to memory of 628 1504 b0a864a148401a06d36c824e148c4bca.exe 36 PID 1504 wrote to memory of 628 1504 b0a864a148401a06d36c824e148c4bca.exe 36 PID 1504 wrote to memory of 628 1504 b0a864a148401a06d36c824e148c4bca.exe 36 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37 PID 1504 wrote to memory of 856 1504 b0a864a148401a06d36c824e148c4bca.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0a864a148401a06d36c824e148c4bca.exe"C:\Users\Admin\AppData\Local\Temp\b0a864a148401a06d36c824e148c4bca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b0a864a148401a06d36c824e148c4bca.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JAwsDkf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JAwsDkf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp91C4.tmp"2⤵
- Creates scheduled task(s)
PID:2844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JAwsDkf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\b0a864a148401a06d36c824e148c4bca.exe"C:\Users\Admin\AppData\Local\Temp\b0a864a148401a06d36c824e148c4bca.exe"2⤵PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc311c40592810e4aa310e138cd2750c
SHA16164b9615735d8c48d97a48eb117f6efc538bbb6
SHA256fef5fc5252e7a31b3aef1b093507580ffa52c05619f5ab8fc8c91f46471927a0
SHA512f032e5b576817da9a6a24ebbce603b065249b637b1c89c982aaaf4057535b0cf871ae951f4632bf21fc833b7e301381d22967b667f6a2dfe33a442031100ea2d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5404750be5eed61406133a88aa48831cc
SHA109cee03b5f878f61eeab99c61872a2ec6bad498f
SHA256c132e7ac3c5d359487cba11d6f7c5b7af0fc47e9f9d7fe0f7b5cdd6cab9084dc
SHA512b2ef2ebef40b9883a1e16ed33360d31ffbf1d05622ffaeb3ea1a694d39b1d981444e3f0b7dd7dedab61f5e1d638dc975bcd9906907548a8b7beec49d2c75b5b1