Analysis
-
max time kernel
100s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 06:52
Behavioral task
behavioral1
Sample
TcpClient.exe
Resource
win7-20240704-en
General
-
Target
TcpClient.exe
-
Size
160KB
-
MD5
2df0cc45516057896f2aa7cbb090ba48
-
SHA1
89d0dd4af7d86333db104470ce22bd25b0c1f8d1
-
SHA256
3eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
-
SHA512
458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv2NYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/2NzQqqDvFf
Malware Config
Extracted
netwire
hazbot.duckdns.org:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
fYGiNfhu
-
offline_keylogger
true
-
password
Hazza2021!
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016d58-9.dat netwire behavioral1/memory/2356-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/3020-10-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 3020 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 2356 TcpClient.exe 2356 TcpClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3020 2356 TcpClient.exe 30 PID 2356 wrote to memory of 3020 2356 TcpClient.exe 30 PID 2356 wrote to memory of 3020 2356 TcpClient.exe 30 PID 2356 wrote to memory of 3020 2356 TcpClient.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD52df0cc45516057896f2aa7cbb090ba48
SHA189d0dd4af7d86333db104470ce22bd25b0c1f8d1
SHA2563eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
SHA512458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e