Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/03/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
d1523e199fbefbec0bc01761b49f981d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1523e199fbefbec0bc01761b49f981d.exe
Resource
win10v2004-20240226-en
General
-
Target
d1523e199fbefbec0bc01761b49f981d.exe
-
Size
2.6MB
-
MD5
d1523e199fbefbec0bc01761b49f981d
-
SHA1
121b2ffa4dc7eca9880d8dca8d5d0fdb6211eb4c
-
SHA256
ba1f01fd0c66cd2d59dcbffa1d5b4387c4249921da221603cc4523e3a58dbbe5
-
SHA512
5cf3ccc467f870f6c6b599e5bf4532e744a841f26dab9fd350f8691348939f7bef4f82fb172bfb3eede59a73e433d8b3db4f407df7cdcfdda027228de06eb40a
-
SSDEEP
49152:Fw80cTsjkWaPgHzoah04We95N5P7OEiF/ivu2BoUxPLPgPkWDSrt:y8sjkY7S4bjOLqv1BoUx0/+r
Malware Config
Extracted
netwire
haija.mine.nu:1338
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
aegispirate
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
OOxTmvdD
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
true
-
startup_name
chrome
-
use_mutex
true
Signatures
-
NetWire RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2588-26-0x0000000000840000-0x0000000000874000-memory.dmp netwire behavioral1/memory/2588-28-0x00000000023B0000-0x00000000023E3000-memory.dmp netwire behavioral1/memory/2536-32-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-33-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-34-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-35-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-37-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-41-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-43-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2536-47-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Core1 .NET packer 1 IoCs
Detects packer/loader used by .NET malware.
resource yara_rule behavioral1/memory/2588-26-0x0000000000840000-0x0000000000874000-memory.dmp Core1 -
Executes dropped EXE 2 IoCs
pid Process 2316 Patch.exe 2588 svchost32.exe -
Loads dropped DLL 4 IoCs
pid Process 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Windows\\SysWow64\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\firefox.exe" svchost32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2588 set thread context of 2536 2588 svchost32.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe 2856 d1523e199fbefbec0bc01761b49f981d.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2316 2856 d1523e199fbefbec0bc01761b49f981d.exe 28 PID 2856 wrote to memory of 2588 2856 d1523e199fbefbec0bc01761b49f981d.exe 29 PID 2856 wrote to memory of 2588 2856 d1523e199fbefbec0bc01761b49f981d.exe 29 PID 2856 wrote to memory of 2588 2856 d1523e199fbefbec0bc01761b49f981d.exe 29 PID 2856 wrote to memory of 2588 2856 d1523e199fbefbec0bc01761b49f981d.exe 29 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30 PID 2588 wrote to memory of 2536 2588 svchost32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1523e199fbefbec0bc01761b49f981d.exe"C:\Users\Admin\AppData\Local\Temp\d1523e199fbefbec0bc01761b49f981d.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Patch.exe"C:\Users\Admin\AppData\Local\Temp\Patch.exe"2⤵
- Executes dropped EXE
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exe"C:\Users\Admin\AppData\Local\Temp\svchost32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWow64\svchost.exe"C:\\Windows\\SysWow64\\svchost.exe"3⤵
- Adds Run key to start application
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD55e82a20678200df6d28ba7327817d71c
SHA1512e3ce2aa8759bc4af5e02666a5096b2bfb5013
SHA256905a0885ec1d28c51fb949579b0d54968f04574c6dd2136d3433ce2cb72b0320
SHA51294a6c66ad926cbad6a90349171d9de32e2c8605bf824f6768611b9bd17b097a8f8c6fc2b687503112224f0ff851010f4c3a7f6ddefcf0d52776afc2ee19ba40b
-
Filesize
1.0MB
MD5d1283216ee4cb9d74a973f0b4830ef24
SHA1c77011773862a9671aed52ac30fd9da1005b7d89
SHA256d1aa5f2504839fc52dce7e10fa5239c39e8f36f3e091eaf5a4eaa86033f14fac
SHA512551d89d13b0553cd88721a1aeaaf9158e30936176ebb403b401e7cee8b0e9bf1d6ca3d31dd0cf1cd81312999264bf10ddcb0d54b5449d955b984724696418b15