Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
knr.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
knr.exe
Resource
win10v2004-20240226-en
General
-
Target
knr.exe
-
Size
2.3MB
-
MD5
cc28e40b46237ab6d5282199ef78c464
-
SHA1
0d5c820002cf93384016bd4a2628dcc5101211f4
-
SHA256
749e161661290e8a2d190b1a66469744127bc25bf46e5d0c6f2e835f4b92db18
-
SHA512
44b689ec760068e505ff4d7d708cb9653bbd1c9cdaac387f76af2bdef99349edd5ac9443125d29938bc77a5a889442c8e99091c5116599ec6f68495f962b5044
-
SSDEEP
49152:HxZKeQAhGOzL0AreYOvAw0nH63BJZoo7IdjU/rVIiP80XfM6Y7:CeQAhGOzJrGvAw0nHoBJZooP/rVIiPvE
Malware Config
Extracted
netwire
dunlop.hopto.org:2032
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
tng
-
install_path
%AppData%\tng\tng.exe
-
keylogger_dir
%AppData%\tgn\
-
lock_executable
true
-
mutex
bmnxcvbT
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
tng
-
use_mutex
true
Signatures
-
NetWire RAT payload 5 IoCs
resource yara_rule behavioral2/memory/924-1-0x00000000025D0000-0x00000000025F2000-memory.dmp netwire behavioral2/memory/924-2-0x0000000002600000-0x000000000262C000-memory.dmp netwire behavioral2/memory/924-9-0x0000000002600000-0x000000000262C000-memory.dmp netwire behavioral2/memory/1172-10-0x00000000023E0000-0x000000000240C000-memory.dmp netwire behavioral2/memory/1172-11-0x00000000023E0000-0x000000000240C000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 1172 tng.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tng = "C:\\Users\\Admin\\AppData\\Roaming\\tng\\tng.exe" tng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 924 wrote to memory of 1172 924 knr.exe 101 PID 924 wrote to memory of 1172 924 knr.exe 101 PID 924 wrote to memory of 1172 924 knr.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\knr.exe"C:\Users\Admin\AppData\Local\Temp\knr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Roaming\tng\tng.exe"C:\Users\Admin\AppData\Roaming\tng\tng.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5173274f28862af61e25b2bba50d41e26
SHA1f513cfe2cc9203dbc943a87fcba94be91923b5ae
SHA256d883d4c953e8d82c8828c06fd4e190f8d0df63c1c1fa59658e1789700d81a7e6
SHA51246f46678dfce70ab3150d1ff846bb75a788119010a2c19525e69c57b010ddb5822c1a031e36c84b40369315cfb5a4c639cab4ad95f4866a7270a36905301b411
-
Filesize
1.3MB
MD5a3a58a16613cf111069845840cf242ae
SHA18ef4dc10608e14c0ec61e245ba947a3ff598ea5a
SHA256de4730c6728c46098f721a1a5f061c336217e77a73b47c6c3da11fa516334d71
SHA512109e595ba0604e0a7224fa102b6b9741c63eaa1ee1af524ca56e4c207f914c7f61ad3e6199afddc82430c7be6b34210f29bf5c07a018817cbb0b3113edcf1a9a