Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 01:13

General

  • Target

    RAT/NetWire.doc

  • Size

    7.3MB

  • MD5

    6b23cce75ff84aaa6216e90b6ce6a5f3

  • SHA1

    e6cc0ef23044de9b1f96b67699c55232aea67f7d

  • SHA256

    9105005851fbf7a7d757109cf697237c0766e6948c7d88089ac6cf25fe1e9b15

  • SHA512

    4d0705644ade8e8a215cc3190717850d88f4d532ac875e504cb59b7e5c6dd3ffae69ea946e2208e2286e2f7168709850b7b6e3b6d0572de40cfe442d96bba125

  • SSDEEP

    49152:GI3M51kvB7YHve+tPHAUpS60t4+6mEuKsXtz5LlqCO4n44m4uXkyNR4Ss3NZx:GuMPkvdYbgUpShGmZfXZZ1O7NRzG

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\runonce.exe
      "C:\Windows\system32\runonce.exe"
      2⤵
      • Process spawned unexpected child process
      PID:2532
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\-2028904607.dat

      Filesize

      474B

      MD5

      108a846fce8e14bec7a3a8c2850d8ed1

      SHA1

      44075cdd5403feadd753986ce39fbc672ca9c69a

      SHA256

      300c5bfa2b54a6c48fb592ba9f2a164dc92d796688f3e43112e696e68a09ed88

      SHA512

      c2f03dad5d470b779de7e2fe36e26c3b112b4f82db76cd5ebd30da71649f1f26326db0632b1dc2bcbe7b80804d4dc8d878b058ce9798bd5d35b722212f6c78da

    • C:\Users\Admin\AppData\Local\Temp\Tar6974.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \Users\Admin\AppData\Local\Temp\ands.dll

      Filesize

      30KB

      MD5

      d4a7e2883571bd5aadc8c42e7dde6288

      SHA1

      90d06ccbcfa36ed581a9a9af5f3581dc36387746

      SHA256

      787b25dc26dc474d9a6a8afe13c20ec3db2d204b390c399029c92da3dbbbdd40

      SHA512

      a204f3be5a0a95c3b6126473b6079965386c4a66d59bc0bbb40772141b65775d7db60b01caced38796c66d2bf7a6d23e8dd4970d7a9a5d40901ac19477d25714

    • \Users\Admin\AppData\Local\Temp\ands.dll

      Filesize

      63KB

      MD5

      6218fe3773cb6838bef254b739c2f664

      SHA1

      fc39665759d3667ec451a2057268ef1b2715577e

      SHA256

      a697ae136e5633a17a2833d1e3e2e2a10cfe274da042d6749becf523bc947eea

      SHA512

      557ddbfc9ac2e8f5209b797b46e3f2782403bbd569ea9450f69be6288fbbe99229123891e9e76e82b1a8c546221ac98ff1aa1a97befe37f0403031f3db26a86a

    • memory/1996-15-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-7-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-13-0x0000000006AC0000-0x0000000006BC0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-14-0x000000007113D000-0x0000000071148000-memory.dmp

      Filesize

      44KB

    • memory/1996-0-0x000000002FE21000-0x000000002FE22000-memory.dmp

      Filesize

      4KB

    • memory/1996-16-0x0000000006AC0000-0x0000000006BC0000-memory.dmp

      Filesize

      1024KB

    • memory/1996-5-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-12-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-23-0x00000000070C0000-0x00000000070C5000-memory.dmp

      Filesize

      20KB

    • memory/1996-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1996-8-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-6-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/1996-2-0x000000007113D000-0x0000000071148000-memory.dmp

      Filesize

      44KB

    • memory/1996-88-0x00000000070C0000-0x00000000070C5000-memory.dmp

      Filesize

      20KB

    • memory/2532-24-0x0000000000090000-0x0000000000092000-memory.dmp

      Filesize

      8KB