Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe
Resource
win7-20240215-en
General
-
Target
e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe
-
Size
1.0MB
-
MD5
9e3dac5c792d10815c94ae9474c93aa8
-
SHA1
da3ffcfa7c41e842ea80548105fac93252149550
-
SHA256
e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85
-
SHA512
69fe825e8c41cdc852407eb2d396344341ceeabcec2edb0bebe269245ca305796975a88d81d557b5cde3fe84c235fb4c26bbad60541b19709ede1240387c956b
-
SSDEEP
24576:bgky9IIScJ+HlZwRqm4QkoWp2xoKkcrETLwWmAae0:b7LwRqm48Wp2+KkcowWmAa
Malware Config
Extracted
netwire
zekeriyasolek44.duckdns.org:3102
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
Valentine End
-
install_path
%Windows%\Windows DataPoint\Windows Data Start.exe
-
lock_executable
false
-
mutex
Windows
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4252-10-0x0000000007FB0000-0x0000000008082000-memory.dmp family_zgrat_v1 -
NetWire RAT payload 10 IoCs
resource yara_rule behavioral2/memory/4524-13-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/4524-15-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/4524-16-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/4524-18-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/4524-31-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1092-37-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1092-38-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1092-39-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1092-41-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/1092-42-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe -
Executes dropped EXE 2 IoCs
pid Process 2548 Windows Data Start.exe 1092 Windows Data Start.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sžHà<¬ú°*uÆÉÝR¡ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\%Windows\\Windows DataPoint\\Windows Data Start.exe" Windows Data Start.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4252 set thread context of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 2548 set thread context of 1092 2548 Windows Data Start.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4252 wrote to memory of 4524 4252 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 97 PID 4524 wrote to memory of 2548 4524 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 98 PID 4524 wrote to memory of 2548 4524 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 98 PID 4524 wrote to memory of 2548 4524 e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe 98 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99 PID 2548 wrote to memory of 1092 2548 Windows Data Start.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe"C:\Users\Admin\AppData\Local\Temp\e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe"C:\Users\Admin\AppData\Local\Temp\e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\%Windows\Windows DataPoint\Windows Data Start.exe"C:\Users\Admin\AppData\Local\Temp\%Windows\Windows DataPoint\Windows Data Start.exe" -m "C:\Users\Admin\AppData\Local\Temp\e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\%Windows\Windows DataPoint\Windows Data Start.exe"C:\Users\Admin\AppData\Local\Temp\%Windows\Windows DataPoint\Windows Data Start.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1092
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59e3dac5c792d10815c94ae9474c93aa8
SHA1da3ffcfa7c41e842ea80548105fac93252149550
SHA256e9b94cae938b5549cc9645b0e15337bc0ff894b9413305351937cf7831347d85
SHA51269fe825e8c41cdc852407eb2d396344341ceeabcec2edb0bebe269245ca305796975a88d81d557b5cde3fe84c235fb4c26bbad60541b19709ede1240387c956b