Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 14:42
Behavioral task
behavioral1
Sample
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
-
Size
160KB
-
MD5
48e6ba377d90401cee819471fcea38b9
-
SHA1
0f6f6ef2b5691946703d37a6316452dda6d5eab5
-
SHA256
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
-
SHA512
caf22b64bf47f6515d7f75dbfc8605ce85a3248188d61049f1cd54ce0b6cbb441fd1005333464f66a95d990e2f912d4b60e5418a4d7b14fd4f115e156cbf307f
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvGdYMjMqqDL0Ff:jOTcK+NrRioGHlz8rz0i/8zQqqDwFf
Malware Config
Extracted
Family
netwire
C2
netwire2021.duckdns.org:7929
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-yISsE2
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
qFlJFfII
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3220-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Program crash 1 IoCs
pid pid_target Process procid_target 4952 3220 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe"C:\Users\Admin\AppData\Local\Temp\b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe"1⤵PID:3220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 3642⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3220 -ip 32201⤵PID:452