Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe
Resource
win10v2004-20240508-en
General
-
Target
3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe
-
Size
296KB
-
MD5
37e922093d8a837b250e72cc87a664cd
-
SHA1
c4d06a2fc80bffbc6a64f92f95ffee02f92c6bb9
-
SHA256
3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62
-
SHA512
5d4a846504c138cf085c8967a1e9b384f0119ac82fecde311331ee577ffff646afbc61c279e1d81ae865df36931a01694bbd47245be4cdd55d821b53faed8510
-
SSDEEP
6144:9HCn0H5swF0lgr9QZHZEKvXBfPbFoG+ScHXg13JQ19PiTBqyT3O+hHVlQu120A:9iQswGgr9QZHZEKvRfPbFoZS2Xg13KiE
Malware Config
Extracted
netwire
37.252.120.122:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Microsoft\Crypto\Office.exe
-
keylogger_dir
%AppData%\Microsoft\Crypto\Logs\
-
lock_executable
false
-
mutex
mJhcimNA
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Office
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/408-4-0x0000000000400000-0x0000000000418000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe -
Executes dropped EXE 1 IoCs
pid Process 1176 Office.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Office = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\Office.exe" Office.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 1176 408 3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe 83 PID 408 wrote to memory of 1176 408 3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe 83 PID 408 wrote to memory of 1176 408 3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe"C:\Users\Admin\AppData\Local\Temp\3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\Office.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\Office.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD537e922093d8a837b250e72cc87a664cd
SHA1c4d06a2fc80bffbc6a64f92f95ffee02f92c6bb9
SHA2563946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62
SHA5125d4a846504c138cf085c8967a1e9b384f0119ac82fecde311331ee577ffff646afbc61c279e1d81ae865df36931a01694bbd47245be4cdd55d821b53faed8510