Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe
Resource
win7-20240221-en
General
-
Target
5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe
-
Size
168KB
-
MD5
c57f16bd980eec7340d1e541877f0098
-
SHA1
1095f812da48ba7aa1dd384fc100681764ccc60f
-
SHA256
5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075
-
SHA512
b6c714223780b3a538d1d1fb88a890cafb55fdc0a7041f2c1d339910c125dadb7d742ae8ba91978d6787fba8494a88422f6ae321562899980ba3e71a1f8d39e4
-
SSDEEP
3072:2DDMqqDLy/7+XIPnGMU4V4KfZnpUs17/WpjVe1XEIoC7KeNQ74mqpLW:1qqDLu7fPGMT/XN/WpQ1UtC7PQYpLW
Malware Config
Extracted
netwire
knudandersen.zapto.org:10665
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
LD_18.02.17
-
install_path
%AppData%\Appconfig\megaphone.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Wq5ZU7dq43vQG8c
-
registry_autorun
true
-
startup_name
Megaphonesone
-
use_mutex
false
Extracted
latentbot
knudandersen.zapto.org
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4320-5-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/4620-16-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/4620-17-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2948 megaphone.exe 4620 megaphone.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Megaphonesone = "C:\\Users\\Admin\\AppData\\Roaming\\Appconfig\\megaphone.exe" megaphone.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe 2948 megaphone.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4236 wrote to memory of 4320 4236 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 97 PID 4320 wrote to memory of 2948 4320 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 98 PID 4320 wrote to memory of 2948 4320 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 98 PID 4320 wrote to memory of 2948 4320 5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe 98 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100 PID 2948 wrote to memory of 4620 2948 megaphone.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe"C:\Users\Admin\AppData\Local\Temp\5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe"C:\Users\Admin\AppData\Local\Temp\5d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Roaming\Appconfig\megaphone.exe"C:\Users\Admin\AppData\Roaming\Appconfig\megaphone.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\Appconfig\megaphone.exe"C:\Users\Admin\AppData\Roaming\Appconfig\megaphone.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c57f16bd980eec7340d1e541877f0098
SHA11095f812da48ba7aa1dd384fc100681764ccc60f
SHA2565d72ad5b0fb0ed3f9ecea2ab0ef372261950fdbd499dc299195858bdf8f22075
SHA512b6c714223780b3a538d1d1fb88a890cafb55fdc0a7041f2c1d339910c125dadb7d742ae8ba91978d6787fba8494a88422f6ae321562899980ba3e71a1f8d39e4