Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
Skan Potwierdzenia.PDF.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Skan Potwierdzenia.PDF.exe
Resource
win10v2004-20240611-en
General
-
Target
Skan Potwierdzenia.PDF.exe
-
Size
128KB
-
MD5
14395ac904015c1ca1ccb42df80a1859
-
SHA1
781bcb5596fbcdaaa998ab77b4621c1000393fbd
-
SHA256
0c141c1fe62782cb78e70d7c57a7b7d07b26a93ee058d271ff7f2fe4c04bfef3
-
SHA512
a8a7c54725c7803ee4da2d7afcbdf52de21faa1567fa46545c4b3b20c4909d110fa7ee356a84d53554660ea32bdde7f7108b6071c7121c9c7ee9a6275cdd8274
-
SSDEEP
3072:AsiXMqGmeABs/iOQlQF0fZyq/pRPFQrQKO854:BiRGzDB8MEptaO24
Malware Config
Extracted
netwire
213.152.162.165:8747
109.202.107.15:8747
213.152.161.117:8747
213.152.161.229:8747
213.152.161.181:8747
37.233.101.73:5555
213.152.162.165:8733
213.152.161.117:8733
213.152.161.229:8733
213.152.161.165:8733
213.152.161.181:8733
-
activex_autorun
true
-
activex_key
{N2P3036X-0CS1-AM05-7POW-541S3F314Q84}
-
copy_executable
true
-
delete_original
true
-
host_id
03.23
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
vvvbljPv
-
offline_keylogger
true
-
password
Mojekurwajebaneboty666
-
registry_autorun
true
-
startup_name
sys
-
use_mutex
true
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2180-3-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2180-8-0x0000000000400000-0x0000000000437000-memory.dmp netwire behavioral1/memory/1184-10-0x0000000000400000-0x0000000000437000-memory.dmp netwire behavioral1/memory/1184-13-0x0000000000400000-0x0000000000437000-memory.dmp netwire behavioral1/memory/1184-14-0x0000000000400000-0x0000000000437000-memory.dmp netwire behavioral1/memory/1184-24-0x0000000000400000-0x0000000000437000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{N2P3036X-0CS1-AM05-7POW-541S3F314Q84} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{N2P3036X-0CS1-AM05-7POW-541S3F314Q84}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Deletes itself 1 IoCs
pid Process 1184 Host.exe -
Executes dropped EXE 1 IoCs
pid Process 1184 Host.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 Skan Potwierdzenia.PDF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\sys = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1184 2180 Skan Potwierdzenia.PDF.exe 29 PID 2180 wrote to memory of 1184 2180 Skan Potwierdzenia.PDF.exe 29 PID 2180 wrote to memory of 1184 2180 Skan Potwierdzenia.PDF.exe 29 PID 2180 wrote to memory of 1184 2180 Skan Potwierdzenia.PDF.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skan Potwierdzenia.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Skan Potwierdzenia.PDF.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\Skan Potwierdzenia.PDF.exe"2⤵
- Modifies Installed Components in the registry
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:1184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD514395ac904015c1ca1ccb42df80a1859
SHA1781bcb5596fbcdaaa998ab77b4621c1000393fbd
SHA2560c141c1fe62782cb78e70d7c57a7b7d07b26a93ee058d271ff7f2fe4c04bfef3
SHA512a8a7c54725c7803ee4da2d7afcbdf52de21faa1567fa46545c4b3b20c4909d110fa7ee356a84d53554660ea32bdde7f7108b6071c7121c9c7ee9a6275cdd8274