Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
21daa55b09213ecdee0108b027b3aa53.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
21daa55b09213ecdee0108b027b3aa53.exe
Resource
win10v2004-20240508-en
General
-
Target
21daa55b09213ecdee0108b027b3aa53.exe
-
Size
561KB
-
MD5
21daa55b09213ecdee0108b027b3aa53
-
SHA1
c6eb2d539531355ce9ce22fe029f0934065dbb7d
-
SHA256
e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
-
SHA512
c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95
-
SSDEEP
6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt
Malware Config
Extracted
netwire
185.163.100.31:3364
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank321
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1564-15-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1564-17-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2372 Windows Utility.exe 1564 Windows Utility.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Utility.exe -boot" Windows Utility.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 1564 2372 Windows Utility.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1540 21daa55b09213ecdee0108b027b3aa53.exe Token: SeDebugPrivilege 2372 Windows Utility.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2480 1540 21daa55b09213ecdee0108b027b3aa53.exe 28 PID 1540 wrote to memory of 2480 1540 21daa55b09213ecdee0108b027b3aa53.exe 28 PID 1540 wrote to memory of 2480 1540 21daa55b09213ecdee0108b027b3aa53.exe 28 PID 1540 wrote to memory of 2480 1540 21daa55b09213ecdee0108b027b3aa53.exe 28 PID 1540 wrote to memory of 2672 1540 21daa55b09213ecdee0108b027b3aa53.exe 30 PID 1540 wrote to memory of 2672 1540 21daa55b09213ecdee0108b027b3aa53.exe 30 PID 1540 wrote to memory of 2672 1540 21daa55b09213ecdee0108b027b3aa53.exe 30 PID 1540 wrote to memory of 2672 1540 21daa55b09213ecdee0108b027b3aa53.exe 30 PID 2464 wrote to memory of 2372 2464 explorer.exe 32 PID 2464 wrote to memory of 2372 2464 explorer.exe 32 PID 2464 wrote to memory of 2372 2464 explorer.exe 32 PID 2464 wrote to memory of 2372 2464 explorer.exe 32 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35 PID 2372 wrote to memory of 1564 2372 Windows Utility.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53.exe"C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53.exe" "C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵PID:2480
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵PID:2672
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\Windows Utility.exe"C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Windows Utility.exe"C:\Users\Admin\AppData\Roaming\Windows Utility.exe"3⤵
- Executes dropped EXE
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
561KB
MD521daa55b09213ecdee0108b027b3aa53
SHA1c6eb2d539531355ce9ce22fe029f0934065dbb7d
SHA256e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
SHA512c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95