Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 20:23

General

  • Target

    33dc068bbb208a5812f58cc18be54c7b6602c41a3fb33be365d0a200579d4126.exe

  • Size

    153KB

  • MD5

    4d68b6296c3c2be8ff00957f424ac629

  • SHA1

    93d6f5442823594f5409b6f379cf9825d71597da

  • SHA256

    33dc068bbb208a5812f58cc18be54c7b6602c41a3fb33be365d0a200579d4126

  • SHA512

    5d098d92cb67f5af99bfaffed4f7d481b1ceb9c0a36e9e5c0305f332e3996ebcd450a0e08cb3874bdbdf906b0c4b0166110f96abf6853cbdff82d85f1597366e

  • SSDEEP

    3072:6o6drfyifGppnIb/qjWteiTs215zeVJ9ikfzrvGsDA:6ljujnv2eideVJ97f/vGsD

Malware Config

Extracted

Family

netwire

C2

162.246.19.20:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 4 IoCs
  • Detects executables packed with Agile.NET / CliSecure 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33dc068bbb208a5812f58cc18be54c7b6602c41a3fb33be365d0a200579d4126.exe
    "C:\Users\Admin\AppData\Local\Temp\33dc068bbb208a5812f58cc18be54c7b6602c41a3fb33be365d0a200579d4126.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\Leads..Cmr..Affiliate...xls"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1412
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Drops file in Windows directory
      PID:2696
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
          4⤵
          • Drops file in Windows directory
          PID:1160
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\AppMgnt.exe.log

    Filesize

    496B

    MD5

    cb76b18ebed3a9f05a14aed43d35fba6

    SHA1

    836a4b4e351846fca08b84149cb734cb59b8c0d6

    SHA256

    8d0edecf54cbbdf7981c8e41a3ed8621503188a87415f9af0fb8d890b138c349

    SHA512

    7631141e4a6dda29452ada666326837372cd3d045f773006f63d9eff15d9432ed00029d9108a72c1a3b858377600a2aab2c9ec03764285c8801b6019babcf21c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    279B

    MD5

    2777e20c2a1dcc741e722ff31c8fe6fe

    SHA1

    76aaaecbd9fd8d1d5133dfe33e1618ef6e3e038d

    SHA256

    7c346a8925f4b69898482c56c020833170485841a7eacef120a5ab399dd78430

    SHA512

    fc443e7c7df8fa6f42d74d7e67516ad4993bed5a7e352977003eda05a3169a2e0b2b9e226596e3d4438a5eac613d45d0cdd374a45ec25662481cbd711e0b0cb3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe

    Filesize

    16KB

    MD5

    e1ff09ecaa1ee7b0dee9bca8f7922976

    SHA1

    2044f0509d4209f551374d16e7ed0957e26f4265

    SHA256

    b01135ce8a97d4e11179eec0e665bb6d016f81ad6959514be71cb1aefa0152e8

    SHA512

    d86d02fae059801bf3ca2a1f629bfb170d5608f30c013d94214d17c7f3dafb4fd206354e8f7abf86a8ba6a2878242daf26aebc60e17fc2021e9ef6a4f88685b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    702B

    MD5

    05b6efacadc0d17ea0a1639b7b80f1f1

    SHA1

    8fb45f6d56455fa661a2f847c884dcc81810ae3f

    SHA256

    74b4a559e2ba2c6d0794c05c760a9485dc7640c9fd3b1ac2f51d78a8d8946dff

    SHA512

    45ccdacc1e8b1142145cf445b120a27e764c62ac776eee23d112179933360a5f1b55323c9de161fad5b3107d9a284aa7ab65d7c6145c15da704c44de41073159

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    24B

    MD5

    4fcb2a3ee025e4a10d21e1b154873fe2

    SHA1

    57658e2fa594b7d0b99d02e041d0f3418e58856b

    SHA256

    90bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228

    SHA512

    4e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe

    Filesize

    153KB

    MD5

    4d68b6296c3c2be8ff00957f424ac629

    SHA1

    93d6f5442823594f5409b6f379cf9825d71597da

    SHA256

    33dc068bbb208a5812f58cc18be54c7b6602c41a3fb33be365d0a200579d4126

    SHA512

    5d098d92cb67f5af99bfaffed4f7d481b1ceb9c0a36e9e5c0305f332e3996ebcd450a0e08cb3874bdbdf906b0c4b0166110f96abf6853cbdff82d85f1597366e

  • C:\Users\Admin\Desktop\Leads..Cmr..Affiliate...xls

    Filesize

    12KB

    MD5

    a1dc845652c054b8eb7445653eb79675

    SHA1

    edc9eb37a513d8eed88a01048db26b25ad95224e

    SHA256

    a6d52a0dfa820cea20bfad1e7dbce92374d474e6fe38ad1fdb4a7a6f8a63fce5

    SHA512

    b4e126dc01b08eb5b0e1c787bd41171b10b03a8923efdfa11489815c91087acde5725f7ba7c19031f0eea692b939869e96fb1d9ac1dbfaa4370ae0cdbdbff258

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier

    Filesize

    68B

    MD5

    7e73a575932bfe36efb66b6e7d3c41cf

    SHA1

    08c60afdb0ed3cca48059787970056a586cb5006

    SHA256

    62b8f6b6dc6a6014b2743673aafddbe984af0bb0faf74b0f782dd42a57cc1716

    SHA512

    5df130bf642836f77b395e7421369ac0bf840d503dc1d29d673e56010038a4786bc883cca6fb09fffdc394503109761ddf7b4f52f3deacc0539652aabf29bcd8

  • memory/1160-103-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1412-36-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-152-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-29-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-34-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-35-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-38-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-37-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-150-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-39-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-149-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-151-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-30-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-153-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-43-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-95-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-44-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-31-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-45-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

    Filesize

    64KB

  • memory/1412-154-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-17-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-88-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-86-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-16-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-15-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/1828-49-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-97-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-50-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1828-51-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-121-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1828-99-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/2580-0-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-85-0x0000000000DA0000-0x0000000000DB0000-memory.dmp

    Filesize

    64KB

  • memory/2580-92-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-1-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-2-0x0000000000DA0000-0x0000000000DB0000-memory.dmp

    Filesize

    64KB

  • memory/2580-3-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-4-0x0000000000DA0000-0x0000000000DB0000-memory.dmp

    Filesize

    64KB

  • memory/2696-42-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2696-25-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2696-13-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3448-94-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/3448-40-0x0000000000CE0000-0x0000000000CF0000-memory.dmp

    Filesize

    64KB

  • memory/3448-41-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/3448-90-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/3448-89-0x0000000000CE0000-0x0000000000CF0000-memory.dmp

    Filesize

    64KB

  • memory/4344-117-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/4344-123-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB

  • memory/4344-124-0x00000000010C0000-0x00000000010D0000-memory.dmp

    Filesize

    64KB

  • memory/4344-116-0x00000000010C0000-0x00000000010D0000-memory.dmp

    Filesize

    64KB

  • memory/4344-115-0x0000000074E80000-0x0000000075431000-memory.dmp

    Filesize

    5.7MB