Overview
overview
10Static
static
10RAT/Adwind.jar
windows7-x64
1RAT/Adwind.jar
windows10-2004-x64
10RAT/Blackkomet.exe
windows7-x64
10RAT/Blackkomet.exe
windows10-2004-x64
10RAT/CobaltStrike.docm
windows7-x64
10RAT/CobaltStrike.docm
windows10-2004-x64
10RAT/CrimsonRAT.exe
windows7-x64
10RAT/CrimsonRAT.exe
windows10-2004-x64
10RAT/NJRat.exe
windows7-x64
10RAT/NJRat.exe
windows10-2004-x64
10RAT/NetWire.doc
windows7-x64
10RAT/NetWire.doc
windows10-2004-x64
7RAT/NetWire.exe
windows7-x64
10RAT/NetWire.exe
windows10-2004-x64
10RAT/Remcos.exe
windows7-x64
10RAT/Remcos.exe
windows10-2004-x64
10RAT/RevengeRAT.exe
windows7-x64
10RAT/RevengeRAT.exe
windows10-2004-x64
10RAT/VanToM-Rat.exe
windows7-x64
7RAT/VanToM-Rat.exe
windows10-2004-x64
7RAT/WarzoneRAT.exe
windows7-x64
10RAT/WarzoneRAT.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
RAT/Adwind.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RAT/Adwind.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
RAT/Blackkomet.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
RAT/Blackkomet.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
RAT/CobaltStrike.docm
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
RAT/CobaltStrike.docm
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
RAT/CrimsonRAT.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
RAT/CrimsonRAT.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
RAT/NJRat.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
RAT/NJRat.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
RAT/NetWire.doc
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
RAT/NetWire.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
RAT/NetWire.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
RAT/NetWire.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
RAT/Remcos.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
RAT/Remcos.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
RAT/RevengeRAT.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
RAT/RevengeRAT.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
RAT/VanToM-Rat.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
RAT/VanToM-Rat.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
RAT/WarzoneRAT.exe
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
RAT/WarzoneRAT.exe
Resource
win10v2004-20240226-en
General
-
Target
RAT/NetWire.exe
-
Size
1.2MB
-
MD5
7621f79a7f66c25ad6c636d5248abeb9
-
SHA1
98304e41f82c3aee82213a286abdee9abf79bcce
-
SHA256
086d35f26bd2fd886e99744960b394d94e74133c40145a3e2bc6b3877b91ec5d
-
SHA512
59ffcf6eeac00c089e9c77192663d0dc97b2e62cedb6d64fe7dc2e67499abc34e33977e05113c9d39ca6d3e37e8b5c3e6aa926c8526215808b147c0152f7dbfd
-
SSDEEP
24576:nBlDgE7EmXWAqSvg439vGSVNe1/hqIiHSvd7:n7DlC+GSjiBiyF
Malware Config
Extracted
modiloader
https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download
Extracted
netwire
tamerimia.ug:6975
vbchjfssdfcxbcver.ru:6975
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
AAAAA
-
lock_executable
false
-
mutex
CQbRXVuG
-
offline_keylogger
false
-
password
jhbkdcfgvdfgknl
-
registry_autorun
false
-
use_mutex
true
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral13/memory/3784-5386-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral13/memory/3784-5435-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral13/memory/2744-4215-0x0000000010410000-0x000000001047E000-memory.dmp modiloader_stage1 behavioral13/memory/2744-4258-0x0000000010410000-0x000000001047E000-memory.dmp modiloader_stage1 -
Executes dropped EXE 2 IoCs
pid Process 1828 fodhelper.exe 1480 fodhelper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Qspt = "C:\\Users\\Admin\\AppData\\Local\\Qspt\\Qspt.hta" NetWire.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 3 drive.google.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 3784 2744 NetWire.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 3712 reg.exe 3776 reg.exe 4032 reg.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28 PID 2208 wrote to memory of 2744 2208 NetWire.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.exe"C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.exe"C:\Users\Admin\AppData\Local\Temp\RAT\NetWire.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2744 -
C:\Windows\SysWOW64\Notepad.exeC:\Windows\System32\Notepad.exe3⤵PID:3324
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Natso.bat" "4⤵PID:3716
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- Modifies registry key
PID:3712
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "5⤵
- Modifies registry key
PID:3776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I5⤵PID:3800
-
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- Modifies registry key
PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Runex.bat" "4⤵PID:2716
-
C:\Windows \System32\fodhelper.exe"C:\Windows \System32\fodhelper.exe"5⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows \System32\fodhelper.exe"C:\Windows \System32\fodhelper.exe"5⤵
- Executes dropped EXE
PID:1480
-
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵PID:3784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283B
MD55cc1682955fd9f5800a8f1530c9a4334
SHA1e09b6a4d729f2f4760ee42520ec30c3192c85548
SHA2565562cc607d2f698327efacc4a21bd079bb14a99b03e7a01b3c67f8440e341cb3
SHA51280767263aad44c739236161d4338d5dd8b0b58613f22cd173c3e88ebf143220ee56bbf93ace69a07d3c2f00daff0adbaa8461a1d53d12699725395c931c43cb6
-
Filesize
226B
MD5f6828e22e6abe87c624e4683fac5889b
SHA1b93d63354d4ddb226dab90955576a6d2cad05ba0
SHA256e1b1884353a51436f90dfed9f85ed9dd98fccfbd13dee7aa54fd901f77fe5e9c
SHA51226afb36afcb3f286b85ebd72061e26f84c33075d3d0767cc93f50ec414a85838c86049e0c56ff43011d1a309b98ae355cbe412203429ac243010dc971ac81ec1
-
Filesize
46KB
MD57215c73ec1aae35b9e4b1f22c811f85c
SHA198551f5184691b65dceba531c4e4975d77cd25a5
SHA2567e80da8d839dcf05e30317256460ed7a4ee25cab2750d768569aaab35e1e8c64
SHA512b68eed48dbd32e485fd56b952e3e642f25f1eefe26ea533b13857e225272ee9668c39552284a438175a323d1685a80d9f878ef0637b5d928bb1e1ed1ac505d61
-
Filesize
108KB
MD5487766bf2f0add388cb123d1ef7ece46
SHA1766564c04d9e8a6745baa2ad28da5d68ad1d79bf
SHA256fa5d5f9bd3a3aece8941e52a00d05db8910d3332f4f276bc03663c7944ae11cb
SHA5123b5c285c4eb749c5e34405b38e146e9fc3fe28c535ee12c4e0f075e167768f37b588e50c2dbd43a27b67b11e7483ad51fcd6b6e7638059dd40bc303c664a8a7e