Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 14:12
Behavioral task
behavioral1
Sample
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe
-
Size
160KB
-
MD5
e477181e703bd428f9346ffe3198e16f
-
SHA1
ca92071f9c5290450fc13f3c11b3cbca20d7b75b
-
SHA256
4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28
-
SHA512
284e7cca5ed9d3635b15fdb9d7d415f9f77986feb4997cabcba71de26a3ef9748bfa636b9b2bb4f9bf51b0adddecf9f8913139a044bef19f55855a9576f924bc
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvG3YMjMqqDuFf:jOTcK+NrRioGHlz8rz0i/uzQqqDuFf
Malware Config
Extracted
Family
netwire
C2
43.226.229.43:2030
Attributes
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
ECHO
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1504-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Program crash 1 IoCs
pid pid_target Process procid_target 4692 1504 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe"C:\Users\Admin\AppData\Local\Temp\4cda545865d04de7de11c1e55d551a53096cbf9efe26bc61fe009695603f1b28.exe"1⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3682⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1504 -ip 15041⤵PID:2044