Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 11:29
Behavioral task
behavioral1
Sample
644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe
Resource
win10v2004-20240226-en
General
-
Target
644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe
-
Size
127KB
-
MD5
69c2af6fffd6537590c7bdba36b5823b
-
SHA1
a2f426e4d013f5400d9e86e251d54b057717f546
-
SHA256
644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24
-
SHA512
6ae6fcc7cd9ce0cc1c02d3fe997a9b1ba2c2eb334d99eca9584954c18961cb1ac7ca14b98b23990f02e2b5dd4290a94df5dd16a2e5d2080ba5fa6ffa7cc29c9d
-
SSDEEP
3072:Uq3E2BfBSbEsz7nCAFVNNvBGvdO5gPaEjep8Fe7Z1iO7ZbvbGV7:BRBfBSosz7nCA3NHCdXaEj7Fe7Z1iOFo
Malware Config
Extracted
netwire
noreply2host.duckdns.org:83
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Hostdyn.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
StLgQSxQ
-
offline_keylogger
true
-
password
Snoopy123
-
registry_autorun
true
-
startup_name
Hostdyn
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000d000000012331-2.dat netwire behavioral1/memory/2324-9-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/2332-10-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2332 Hostdyn.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hostdyn = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Hostdyn.exe" Hostdyn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2332 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe 28 PID 2324 wrote to memory of 2332 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe 28 PID 2324 wrote to memory of 2332 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe 28 PID 2324 wrote to memory of 2332 2324 644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe"C:\Users\Admin\AppData\Local\Temp\644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Install\Hostdyn.exe"C:\Users\Admin\AppData\Roaming\Install\Hostdyn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD569c2af6fffd6537590c7bdba36b5823b
SHA1a2f426e4d013f5400d9e86e251d54b057717f546
SHA256644985bd33d378f4ca9fde53e472652a6d175cc14e202e4703a265daac774a24
SHA5126ae6fcc7cd9ce0cc1c02d3fe997a9b1ba2c2eb334d99eca9584954c18961cb1ac7ca14b98b23990f02e2b5dd4290a94df5dd16a2e5d2080ba5fa6ffa7cc29c9d