Overview
overview
10Static
static
724.exe
windows7-x64
1024.exe
windows10-2004-x64
104.exe
windows7-x64
104.exe
windows10-2004-x64
107.exe
windows7-x64
107.exe
windows10-2004-x64
10Order.exe
windows7-x64
10Order.exe
windows10-2004-x64
10load2.exe
windows7-x64
load2.exe
windows10-2004-x64
spart.exe
windows7-x64
7spart.exe
windows10-2004-x64
7swift.exe
windows7-x64
10swift.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 17:00
Behavioral task
behavioral1
Sample
24.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
7.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Order.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Order.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
load2.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
load2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
spart.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
spart.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
swift.exe
Resource
win7-20240221-en
General
-
Target
24.exe
-
Size
231KB
-
MD5
260b768a03390af34cf4d91ced33fb0e
-
SHA1
19022cee29e978d9e56af5931421c115c522ee31
-
SHA256
d4103e933d33c9257967b632f9c4cedc5f57e15abd2c0357ce7e9966881cc97d
-
SHA512
05fd9b1eba3f4217b49b4b7eed58634eb7cf944dfa367a0e868c15862a3399e6e874754ab9ffda785a47a7b850d6e24bc777ba55fe47c1405cd28534869841c3
-
SSDEEP
3072:2xfqOcLw3jpU6+NAs9ejLSxKy2jSb/DCKvNSs7ZAHS6vYAdz7QgRrYEaFxuAc2:wqOPzpU6+NCLSK8GBcZAHStYXRrYHc2
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
extensions14718sec.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YbcwLUQv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3556-24-0x0000000005CC0000-0x0000000005CEC000-memory.dmp netwire behavioral2/memory/408-27-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/408-30-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/408-29-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/408-32-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/408-39-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
24.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tEsQxF.url 24.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
24.exedescription pid process target process PID 3556 set thread context of 408 3556 24.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
24.exepid process 3556 24.exe 3556 24.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
24.exedescription pid process Token: SeDebugPrivilege 3556 24.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
24.execsc.exedescription pid process target process PID 3556 wrote to memory of 4444 3556 24.exe csc.exe PID 3556 wrote to memory of 4444 3556 24.exe csc.exe PID 3556 wrote to memory of 4444 3556 24.exe csc.exe PID 4444 wrote to memory of 3384 4444 csc.exe cvtres.exe PID 4444 wrote to memory of 3384 4444 csc.exe cvtres.exe PID 4444 wrote to memory of 3384 4444 csc.exe cvtres.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe PID 3556 wrote to memory of 408 3556 24.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0j4axnoz\0j4axnoz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38E2.tmp" "c:\Users\Admin\AppData\Local\Temp\0j4axnoz\CSC812B946C87DE4EFC924A0A4555BECE.TMP"3⤵PID:3384
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0j4axnoz\0j4axnoz.dllFilesize
14KB
MD5d14b781826e2425e87e45e522a11deab
SHA105c6d492332447f0eb391213f584e9691d47272a
SHA2568f511ce7bc085ca8aa7f0baf1f5994a1bec50e40fec6e2fee2d16df7dca67485
SHA512e256941a2d6332edcdaccfff27954a1ef79abee05cfdd7d9eae5c8fd33088dd26e2479185217aba622823d32d7c58519218ee6d7f79baf5830a602ca06b5c669
-
C:\Users\Admin\AppData\Local\Temp\0j4axnoz\0j4axnoz.pdbFilesize
49KB
MD5a51d83561f415f888128b40b0cf67cd8
SHA19b4e7759abe186791d762fb40907445f4521cfbe
SHA25624c68106bd1af1ec0d2061563548bbf6f000a3f5d7850b2bf53d10913a7b22f7
SHA512de43ff18aab5c4636f94ab0e952f9b409879f49c7a292e0eb7d2dedb07648562981ed58cafc8919755466d54343bfaff7186438a07543bfbdbc7e5eb3224ceed
-
C:\Users\Admin\AppData\Local\Temp\RES38E2.tmpFilesize
1KB
MD57bd19ae6692e3d3c79b64da9803e6168
SHA1b4e93124170faa4bd193655c79318c214695161e
SHA256864ad28587e8a354cdf598945823a5a35dd541b8e70c16978448fef1f3236d4e
SHA512b25dcdf2be8083ccfe1ee7e588b4281715c8f0a3f0903a011c657c57741ddf1414eabe85624d1d9b6d02fe31599578eddb40ec4eb11f18cc97ecfc830745abb2
-
\??\c:\Users\Admin\AppData\Local\Temp\0j4axnoz\0j4axnoz.0.csFilesize
28KB
MD5775bb4ff684fb0f6da487cc2420a3f6a
SHA19fbc1385b325aaa6b0677fc0690094e5711cd719
SHA2564ece1996c472ceb3dd020487771dfdcabddc1e12503b4a31d099e3ef5f649c3a
SHA5128786a6108139f210131565526c2561f425b5a39fc9036e0fbbea30e83f8f54bce4ae44503ad6f720713a3162e97eeeb41803da0ff236690da1a34ac69ecb0929
-
\??\c:\Users\Admin\AppData\Local\Temp\0j4axnoz\0j4axnoz.cmdlineFilesize
312B
MD5fb9261ce88ff55222654706418a2999d
SHA1cf520154b9682ff8dfd98dd8c2b7df281973a5f5
SHA25657fb562c042f6b2c8a70df0c423a5da44f460177d90150abce8289a6be7dfe3e
SHA5126b46f599d25b68789e361132221c7cdf08ea5c1510f58f85c4b552815c1a37ac3c9d2979d381be6f819ce6962ab594047d8715d61c8cd1e92f009c2db14edab2
-
\??\c:\Users\Admin\AppData\Local\Temp\0j4axnoz\CSC812B946C87DE4EFC924A0A4555BECE.TMPFilesize
1KB
MD5b7d23888a16043634ed7fbece2658e5c
SHA1b873694a7a1d6d1d519aee0ffedde94acd0531b1
SHA25678d2675a99cb5a8c4481d96043582e496ec5eb56c5ef4b9c4382ad5baa2d7f5f
SHA5124bd28450e8776938dffc7d88cf4642c368120739742d8808d1bcd5468470b678f74613e1fd1fe3b81e5225073326786e031106d12789c75d7307b43159b91b27
-
memory/408-27-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/408-39-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/408-32-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/408-29-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/408-30-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3556-17-0x0000000003260000-0x000000000326A000-memory.dmpFilesize
40KB
-
memory/3556-21-0x0000000005A10000-0x0000000005A1C000-memory.dmpFilesize
48KB
-
memory/3556-24-0x0000000005CC0000-0x0000000005CEC000-memory.dmpFilesize
176KB
-
memory/3556-25-0x0000000005F40000-0x0000000005FDC000-memory.dmpFilesize
624KB
-
memory/3556-20-0x0000000005C80000-0x0000000005CB2000-memory.dmpFilesize
200KB
-
memory/3556-1-0x0000000000E20000-0x0000000000E60000-memory.dmpFilesize
256KB
-
memory/3556-0-0x0000000074C1E000-0x0000000074C1F000-memory.dmpFilesize
4KB
-
memory/3556-31-0x0000000074C10000-0x00000000753C0000-memory.dmpFilesize
7.7MB
-
memory/3556-19-0x0000000005870000-0x0000000005902000-memory.dmpFilesize
584KB
-
memory/3556-5-0x0000000074C10000-0x00000000753C0000-memory.dmpFilesize
7.7MB