Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 01:12
Behavioral task
behavioral1
Sample
8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe
-
Size
84KB
-
MD5
02249b59bff7fa6b932d09cce70dc5b8
-
SHA1
93ef935fc9041c0f37bc2cb6d60e2591e33cc86e
-
SHA256
8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20
-
SHA512
948339aafc124fdc15c152f1eccefa2ad5ebfd732b71bbb6bebd832bb61296027b494d0fddf18e5347c798e91c3fcc0ab000f54362dcc4012da777148923961b
-
SSDEEP
1536:7Lp3YvQCGQ10ismSklVI8VjCX1Isv3fA9qeRgLHsbg/+ySr1Ra:7Lp3Yvhn9VI8VjCX1I43fAwegLMbrO
Malware Config
Extracted
Family
netwire
C2
86t7b9br9.ddns.net:8980
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-MAm4sa
-
lock_executable
false
-
offline_keylogger
false
-
password
4678553478654HJKGHKJGHKJG4543
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3472-0-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3472-1-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
resource yara_rule behavioral2/memory/3472-0-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3472-1-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Program crash 1 IoCs
pid pid_target Process procid_target 5004 3472 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe"C:\Users\Admin\AppData\Local\Temp\8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe"1⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 3402⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3472 -ip 34721⤵PID:4024