Overview
overview
10Static
static
3c83d319f8b...86.exe
windows7-x64
10c83d319f8b...86.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3National-C...2.html
windows7-x64
1National-C...2.html
windows10-2004-x64
1challenge.js
windows7-x64
1challenge.js
windows10-2004-x64
1maximenuckmobile.js
windows7-x64
1maximenuckmobile.js
windows10-2004-x64
1planet-phi...y.html
windows7-x64
1planet-phi...y.html
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/TypeLib.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/TypeLib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
National-Conference-in-Sales-Management-3013382.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
National-Conference-in-Sales-Management-3013382.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
challenge.js
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
challenge.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
maximenuckmobile.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
maximenuckmobile.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
planet-philosophy.html
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
planet-philosophy.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
template.js
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
template.js
Resource
win10v2004-20240412-en
General
-
Target
c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe
-
Size
185KB
-
MD5
38a2136cedc0162445b5cec855d85d44
-
SHA1
71ea45dac1e072ad1afe791c3281d1a94bf71918
-
SHA256
c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86
-
SHA512
6f48d227588e40122aa44424502c23494b5d6f3b890f8445c69e0221b3e70b8198f3e173932edd59d1b047f944feaeadf3c87f145516550b658ed250c0d3e6e0
-
SSDEEP
3072:yIWGC7W7BuDcYzIknj3WCW2EW5x45EWAzPAh/iAe4ggheTgmgWWEc9lj2neR6iPE:IGC7W7BUr6AOiAe4gkgHg/n12nS6c5Ml
Malware Config
Extracted
netwire
45.63.76.86:1120
-
activex_autorun
true
-
activex_key
{1R455CO6-36TS-LD3E-GQ01-UU88VXGO4JBR}
-
copy_executable
true
-
delete_original
false
-
host_id
MaHustlKoNiBaje
-
install_path
%AllUsersProfile%\Antivirus\VirusCleaner.exe
-
keylogger_dir
%AllUsersProfile%\Logs\
-
lock_executable
true
-
mutex
GkkuSoNR
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
AntiVirusCleaner
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2556-18-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/2556-21-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/2556-23-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/2684-64-0x0000000000400000-0x000000000041F000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1R455CO6-36TS-LD3E-GQ01-UU88VXGO4JBR} VirusCleaner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1R455CO6-36TS-LD3E-GQ01-UU88VXGO4JBR}\StubPath = "\"C:\\ProgramData\\Antivirus\\VirusCleaner.exe\"" VirusCleaner.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 VirusCleaner.exe 2684 VirusCleaner.exe -
Loads dropped DLL 3 IoCs
pid Process 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 2556 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 2720 VirusCleaner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirusCleaner = "C:\\ProgramData\\Antivirus\\VirusCleaner.exe" VirusCleaner.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3048 set thread context of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 2720 set thread context of 2684 2720 VirusCleaner.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 2720 VirusCleaner.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 3048 wrote to memory of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 3048 wrote to memory of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 3048 wrote to memory of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 3048 wrote to memory of 2556 3048 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 28 PID 2556 wrote to memory of 2720 2556 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 29 PID 2556 wrote to memory of 2720 2556 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 29 PID 2556 wrote to memory of 2720 2556 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 29 PID 2556 wrote to memory of 2720 2556 c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe 29 PID 2720 wrote to memory of 2684 2720 VirusCleaner.exe 30 PID 2720 wrote to memory of 2684 2720 VirusCleaner.exe 30 PID 2720 wrote to memory of 2684 2720 VirusCleaner.exe 30 PID 2720 wrote to memory of 2684 2720 VirusCleaner.exe 30 PID 2720 wrote to memory of 2684 2720 VirusCleaner.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe"C:\Users\Admin\AppData\Local\Temp\c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe"C:\Users\Admin\AppData\Local\Temp\c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\ProgramData\Antivirus\VirusCleaner.exe"C:\ProgramData\Antivirus\VirusCleaner.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\ProgramData\Antivirus\VirusCleaner.exe"C:\ProgramData\Antivirus\VirusCleaner.exe"4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
PID:2684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD538a2136cedc0162445b5cec855d85d44
SHA171ea45dac1e072ad1afe791c3281d1a94bf71918
SHA256c83d319f8b4f4ec7f158298617e52b99cb9cda0603799fc5789b6888791b2d86
SHA5126f48d227588e40122aa44424502c23494b5d6f3b890f8445c69e0221b3e70b8198f3e173932edd59d1b047f944feaeadf3c87f145516550b658ed250c0d3e6e0
-
Filesize
17KB
MD50a4a2e4a24592f8652dbc565c6a66a58
SHA1282d9004cde9e2a676f8228ff561e885cfb7aed5
SHA2560e3feedfdd5aacb3ce08e1973ffd86bd2708998a8339777e20936fce5c1c5264
SHA512f2b76e81302f9bc08fb9edb8e58773c7832bf9485e88dc054657d77b79041c66ca902bb872da1c5c119cd27042e52f09bd6fd3848baf353b674d0fb90894e7b2
-
Filesize
11KB
MD563eb8585fe4f1c64f870c8bf881bf4c1
SHA1032062d976b03cf3e0d6ef1946e39fa0ec9d7f01
SHA25606a46711da5a70739d79146fc2127ed9b0bf12b302a6959e0ef8c02aa9382e71
SHA51279f2bebd7e7de4b10973b921a45d5386e0839fc24e2ea8a6c79c00b1e8e90b3c90521c07ee96b820593cf38fdeac83f4c9e0bc0a26cea945f8f47be91ec7926a
-
Filesize
8KB
MD5dd1274684075ce70b004944e8129e93d
SHA11e06992a48a6b74150221a3c0e1a46f4197a248f
SHA25625d21a3a6b617e3a88073aab38c7e896b6e3a6de3ec0a2e71b914282e569f529
SHA5125d4956ebac47779920c3e4347d71a6a719afec9bd271e3898186524a33c8c21358a2b9edf8d560962b863ba10b97d85a606d5b27713188d7495c8227045d227d
-
Filesize
8KB
MD5a6d7aea12e39ded8bc2f2337888b373f
SHA146136fd27d6107f8e2adccf70862ea0ef5529010
SHA256b0ddd10ad1c95864b9d14ac063d507d45a3e4c59079530d21591b854ea586abd
SHA51227ef5e43668ba0dfaa5df5eec824f397fb734e65961511bac3829a3d4b82b924d9fb65dc5c3ae58939ff38213dab2fb2e21ff10900ebb73d3cc661bc381be0b0
-
Filesize
3KB
MD5b7e2f1e2fcfc0b6352249d393a0d7a9e
SHA130a9e8ac20e0ca743144ce9cc34a3eb83dc650a8
SHA256504172619913a0335e27cd90f92214e8f33fe11961b856b22d053c57baa7aa6e
SHA51234d4b077432420d64b0a053faf0d8a22191fb8ab0995d7deda071cc77ba2b9025c2ea45998860883ebe9f031d908936ed2ee574b35d5a1136766330af71c7b75
-
Filesize
6KB
MD546603c413c393c9575b33f3330afc1ca
SHA12203cad76739e8a301d5b4eecc1faf928154f152
SHA2566f010f776f492084c332626f6e3edf82846e7461e09dbec84f3413fe7a530c10
SHA512e76ee316a6322351ca727797d93086ede1a37aac5ece47ec7dc95f3106406bc0e20ea8d5523bc9bbf1dad4e3a673fc5649d974bde682aad55d09059635079592
-
Filesize
996B
MD55cec327786d139b695754039c0a740eb
SHA15cf1426f7f39ec276ea1b1da9ddc8bf14cff0ee8
SHA256a0c9f40c881627e27cce7fb403b92115345e62a8b34ce2d23357e71d161d7dc2
SHA5120648f0136598436d46ecf272f45fa5bbb5ad66d0f043d289a12f9971aae65bd6ecbeeeb7f070c80ce6fdd223c7b6f7a8e9f07e11d341bc7c7ffcba5b54acd27f
-
Filesize
2KB
MD509d6124079f24d0a7244a0df6b0a5f03
SHA1710cb2305c1d5fc3c04481e6be72d34babef111c
SHA2563dfb96687b0848b09705cb3f50994ae36f32bcecfa3a04a17a48f3ef00a894dd
SHA512b337e3a2fe91161b1bdb06ff047e65f08701c4a4997da49e9c20de06823afa25189cf7b8ef7b8f6061a3302a2313da7c345a7d078563ee73f2a4306c83928055
-
Filesize
1KB
MD55c2caeb64fc97d72abdbb36f0e08eb4d
SHA1f937168b8206e1886d39d98ac0252b019bce33f5
SHA256ce6bb495c89ece63d70d40434176fa04ce5047eeb9e5aace93511aa2954e0038
SHA512360b6a349ccabeebf69de6b3033f2e0f6711fa6c15ace6a58e26baf30749aef88726359ced7686f6794182640b4b15099a9a9b9ab395123b22c60687c6fb2412
-
Filesize
87KB
MD54879286d9a4bd8533ceceda07bcb9fab
SHA1cc2b89321354de489216535df865c3f9473be41c
SHA256d38cc02e7bdf9e8c7cfccde4aa0cdd88339fd047a8567b2037dd1bb2e2e80e0c
SHA512853f686f5e00e3e8a676b93721ab521c1001827fe3c37513a63cd3f81c7522a19d5d5a30fdd43e67e889c5893a87002ce830bd2d73522e87ad7a70ccdf281791
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706