Analysis
-
max time kernel
110s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 06:52
Behavioral task
behavioral1
Sample
TcpClient.exe
Resource
win7-20240704-en
General
-
Target
TcpClient.exe
-
Size
160KB
-
MD5
2df0cc45516057896f2aa7cbb090ba48
-
SHA1
89d0dd4af7d86333db104470ce22bd25b0c1f8d1
-
SHA256
3eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
-
SHA512
458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv2NYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/2NzQqqDvFf
Malware Config
Extracted
netwire
hazbot.duckdns.org:3360
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
fYGiNfhu
-
offline_keylogger
true
-
password
Hazza2021!
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000a0000000233f8-4.dat netwire behavioral2/memory/2256-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4540-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation TcpClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4540 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4540 2256 TcpClient.exe 85 PID 2256 wrote to memory of 4540 2256 TcpClient.exe 85 PID 2256 wrote to memory of 4540 2256 TcpClient.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\TcpClient.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD52df0cc45516057896f2aa7cbb090ba48
SHA189d0dd4af7d86333db104470ce22bd25b0c1f8d1
SHA2563eb685dfb2506c3ec019ea69b788b771676d6a8d1eedf9ba08db8175966784fc
SHA512458b6e2a724bd191383ff37078bb9b8df181da7c2801decafd5c7cdf7c52df6cc93b665f275b24e9bb7fdaa56cb0cd93df9c7227ee3d2865e84072a650abd43e