Analysis
-
max time kernel
117s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
72e501519df227a8187dd9d4bb499fd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72e501519df227a8187dd9d4bb499fd0N.exe
Resource
win10v2004-20240709-en
General
-
Target
72e501519df227a8187dd9d4bb499fd0N.exe
-
Size
847KB
-
MD5
72e501519df227a8187dd9d4bb499fd0
-
SHA1
5792e1936da039d04bbe5d372004df5d798bd739
-
SHA256
3f4a2e22fb7cb3d484faf02cb27c71ff1b9ccd110f7dae5e8043013a5f8c3c52
-
SHA512
30408083e019df72008bbbe5b330dba98e71a47be678cbeb5420fbe0136700da091be469a543acd85a61b81da611e557b07f126df0da0d77415f03f1adad1c02
-
SSDEEP
12288:+GdQQdRcc8xl/hy/m6Io77RAKVtgVpA9TUsUzq9Yt5IlSOArWFazwb3C2kUg:+OQQGfCm6IQAE59TUEGylNArWgqC2kV
Malware Config
Extracted
netwire
94.242.59.7:56565
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
VPS
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Appleaddict45@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4100-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4100-50-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4100-88-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 72e501519df227a8187dd9d4bb499fd0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4312 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 4312 conhost.exe 4312 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BjrService = "C:\\Users\\Admin\\AppData\\Roaming\\IpdService\\contest.exe" 72e501519df227a8187dd9d4bb499fd0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3252 set thread context of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1448 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1448 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3252 72e501519df227a8187dd9d4bb499fd0N.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4312 3252 72e501519df227a8187dd9d4bb499fd0N.exe 87 PID 3252 wrote to memory of 4312 3252 72e501519df227a8187dd9d4bb499fd0N.exe 87 PID 3252 wrote to memory of 4312 3252 72e501519df227a8187dd9d4bb499fd0N.exe 87 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88 PID 3252 wrote to memory of 4100 3252 72e501519df227a8187dd9d4bb499fd0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"C:\Users\Admin\AppData\Local\Temp\72e501519df227a8187dd9d4bb499fd0N.exe"2⤵PID:4100
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x3081⤵
- Suspicious use of AdjustPrivilegeToken
PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b
-
Filesize
565KB
MD5e2f36b23167882c584d1ef1642fc2b01
SHA141ad4b4f935c54b284f8b993efa9f5e81a887006
SHA256a417e8c0a5e9f8a93743e4c8972cfc4f912ec0f9000f706df4836037dca38d53
SHA512c42bd7158d64e73d6ffb1097d062fd30a646b445d05e722f28403d13a1c721c8bfc81b3f06701d5b373f74ec666c169cd6dec67e83bb22b9e0887194b1c1abc1
-
Filesize
547KB
MD57b677aa98986a1145c31bc858fc45244
SHA18cc61dbeca97c9e00bd2c919a99e9757d882381e
SHA2567fc4cef987d57a407101ffec1aeb75233c758449597665b1635cdbf4aa7bd8fa
SHA512c7a43d810adf73cd042f456fe8f64a4bff5edd73d37a6b9bb6c8d4bfbb3e422a95a0bc7a9de9b84b5e587fd543a75b60df78d7819c26e0eb681290d8bee1b63b