Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
أمر الشراء 90037-2020.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
أمر الشراء 90037-2020.exe
Resource
win10v2004-20240508-en
General
-
Target
أمر الشراء 90037-2020.exe
-
Size
762KB
-
MD5
598b0e23c0eb2baffc02fd05ce1b41e9
-
SHA1
4129fe98ba4e3580b3b05b61a06e301ae9c4b958
-
SHA256
a9a8374950d68997b782dca8ae2464aa81709c2f51bcc8fdb1abdcfb5b40c521
-
SHA512
e0b9a407e34ec24dbb76b84899f2d8665a87e02f1d278007357f1cb9680a712cd91d222e57340caed8337be1c7e66cf91d9586f7403ca31412920b1b8633c619
-
SSDEEP
12288:1CbpcLhilrm7G8oclWEAroCo3DQmTccdAAo3ZNytUAV:auLhi80Jro7JATZ0
Malware Config
Extracted
netwire
43.226.229.43:2030
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
ALPHA
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral2/memory/4392-3-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4392-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4392-5-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4772-33-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1576-32-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1576-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1576-36-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4772-37-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation أمر الشراء 90037-2020.exe -
Executes dropped EXE 3 IoCs
pid Process 5036 Host.exe 1576 Host.exe 4008 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\أمر الشراء 90037-2020.exe" أمر الشراء 90037-2020.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2824 set thread context of 4392 2824 أمر الشراء 90037-2020.exe 83 PID 3304 set thread context of 4772 3304 أمر الشراء 90037-2020.exe 90 PID 5036 set thread context of 1576 5036 Host.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 أمر الشراء 90037-2020.exe 2824 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 1364 أمر الشراء 90037-2020.exe 5036 Host.exe 5036 Host.exe 3304 أمر الشراء 90037-2020.exe 3304 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 900 أمر الشراء 90037-2020.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe 4008 Host.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2824 أمر الشراء 90037-2020.exe 5036 Host.exe 3304 أمر الشراء 90037-2020.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2824 wrote to memory of 4392 2824 أمر الشراء 90037-2020.exe 83 PID 2824 wrote to memory of 4392 2824 أمر الشراء 90037-2020.exe 83 PID 2824 wrote to memory of 4392 2824 أمر الشراء 90037-2020.exe 83 PID 2824 wrote to memory of 1364 2824 أمر الشراء 90037-2020.exe 84 PID 2824 wrote to memory of 1364 2824 أمر الشراء 90037-2020.exe 84 PID 2824 wrote to memory of 1364 2824 أمر الشراء 90037-2020.exe 84 PID 4392 wrote to memory of 5036 4392 أمر الشراء 90037-2020.exe 86 PID 4392 wrote to memory of 5036 4392 أمر الشراء 90037-2020.exe 86 PID 4392 wrote to memory of 5036 4392 أمر الشراء 90037-2020.exe 86 PID 1364 wrote to memory of 3304 1364 أمر الشراء 90037-2020.exe 88 PID 1364 wrote to memory of 3304 1364 أمر الشراء 90037-2020.exe 88 PID 1364 wrote to memory of 3304 1364 أمر الشراء 90037-2020.exe 88 PID 5036 wrote to memory of 1576 5036 Host.exe 89 PID 5036 wrote to memory of 1576 5036 Host.exe 89 PID 5036 wrote to memory of 1576 5036 Host.exe 89 PID 3304 wrote to memory of 4772 3304 أمر الشراء 90037-2020.exe 90 PID 3304 wrote to memory of 4772 3304 أمر الشراء 90037-2020.exe 90 PID 3304 wrote to memory of 4772 3304 أمر الشراء 90037-2020.exe 90 PID 3304 wrote to memory of 900 3304 أمر الشراء 90037-2020.exe 91 PID 3304 wrote to memory of 900 3304 أمر الشراء 90037-2020.exe 91 PID 3304 wrote to memory of 900 3304 أمر الشراء 90037-2020.exe 91 PID 5036 wrote to memory of 4008 5036 Host.exe 92 PID 5036 wrote to memory of 4008 5036 Host.exe 92 PID 5036 wrote to memory of 4008 5036 Host.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 1576 2406019374⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe" 2 4392 2406015312⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"4⤵
- Adds Run key to start application
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe"C:\Users\Admin\AppData\Local\Temp\أمر الشراء 90037-2020.exe" 2 4772 2406019374⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD5598b0e23c0eb2baffc02fd05ce1b41e9
SHA14129fe98ba4e3580b3b05b61a06e301ae9c4b958
SHA256a9a8374950d68997b782dca8ae2464aa81709c2f51bcc8fdb1abdcfb5b40c521
SHA512e0b9a407e34ec24dbb76b84899f2d8665a87e02f1d278007357f1cb9680a712cd91d222e57340caed8337be1c7e66cf91d9586f7403ca31412920b1b8633c619