Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
72e501519df227a8187dd9d4bb499fd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72e501519df227a8187dd9d4bb499fd0N.exe
Resource
win10v2004-20240709-en
General
-
Target
72e501519df227a8187dd9d4bb499fd0N.exe
-
Size
847KB
-
MD5
72e501519df227a8187dd9d4bb499fd0
-
SHA1
5792e1936da039d04bbe5d372004df5d798bd739
-
SHA256
3f4a2e22fb7cb3d484faf02cb27c71ff1b9ccd110f7dae5e8043013a5f8c3c52
-
SHA512
30408083e019df72008bbbe5b330dba98e71a47be678cbeb5420fbe0136700da091be469a543acd85a61b81da611e557b07f126df0da0d77415f03f1adad1c02
-
SSDEEP
12288:+GdQQdRcc8xl/hy/m6Io77RAKVtgVpA9TUsUzq9Yt5IlSOArWFazwb3C2kUg:+OQQGfCm6IQAE59TUEGylNArWgqC2kV
Malware Config
Extracted
netwire
94.242.59.7:56565
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
VPS
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Appleaddict45@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2768-12-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2768-42-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2768-44-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2768-47-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2768-51-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2768-56-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2772 conhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2196 72e501519df227a8187dd9d4bb499fd0N.exe 2772 conhost.exe 2772 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\BjrService = "C:\\Users\\Admin\\AppData\\Roaming\\IpdService\\contest.exe" 72e501519df227a8187dd9d4bb499fd0N.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2196 set thread context of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 set thread context of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2196 72e501519df227a8187dd9d4bb499fd0N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2772 2196 72e501519df227a8187dd9d4bb499fd0N.exe 30 PID 2196 wrote to memory of 2772 2196 72e501519df227a8187dd9d4bb499fd0N.exe 30 PID 2196 wrote to memory of 2772 2196 72e501519df227a8187dd9d4bb499fd0N.exe 30 PID 2196 wrote to memory of 2772 2196 72e501519df227a8187dd9d4bb499fd0N.exe 30 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31 PID 2196 wrote to memory of 2768 2196 72e501519df227a8187dd9d4bb499fd0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"2⤵PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
565KB
MD5e2f36b23167882c584d1ef1642fc2b01
SHA141ad4b4f935c54b284f8b993efa9f5e81a887006
SHA256a417e8c0a5e9f8a93743e4c8972cfc4f912ec0f9000f706df4836037dca38d53
SHA512c42bd7158d64e73d6ffb1097d062fd30a646b445d05e722f28403d13a1c721c8bfc81b3f06701d5b373f74ec666c169cd6dec67e83bb22b9e0887194b1c1abc1
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b
-
Filesize
547KB
MD57b677aa98986a1145c31bc858fc45244
SHA18cc61dbeca97c9e00bd2c919a99e9757d882381e
SHA2567fc4cef987d57a407101ffec1aeb75233c758449597665b1635cdbf4aa7bd8fa
SHA512c7a43d810adf73cd042f456fe8f64a4bff5edd73d37a6b9bb6c8d4bfbb3e422a95a0bc7a9de9b84b5e587fd543a75b60df78d7819c26e0eb681290d8bee1b63b