Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240708-en
General
-
Target
New order.exe
-
Size
615KB
-
MD5
9df25a599697716759c0183e3284f8aa
-
SHA1
405af3516b660318f006c16b2829adf0ec8e7d14
-
SHA256
c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
-
SHA512
e13a74ee635eea2c77ed1e4b7b8074de3f87e530a20ee1ec3763933e915621adcdf3c057d6b5e19e80d1ffed776482a47b08e4b996d2f6f0c981fac86e109f27
-
SSDEEP
6144:NqWjPKnTiEObu5HRp7l9BdE7ZPZlI8xSE:NqWjPKTJ5DzEVM8AE
Malware Config
Extracted
netwire
79.134.225.94:7119
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
New order
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/2972-17-0x0000000000720000-0x000000000074C000-memory.dmp netwire behavioral2/memory/2972-14-0x0000000000720000-0x000000000074C000-memory.dmp netwire behavioral2/memory/2972-24-0x0000000000720000-0x000000000074C000-memory.dmp netwire behavioral2/memory/2972-22-0x0000000000720000-0x000000000074C000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation New order.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 svhost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini New order.exe File opened for modification C:\Windows\assembly\Desktop.ini New order.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2972 2304 New order.exe 94 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly New order.exe File created C:\Windows\assembly\Desktop.ini New order.exe File opened for modification C:\Windows\assembly\Desktop.ini New order.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2972 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2304 New order.exe 2304 New order.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2304 New order.exe Token: 33 2304 New order.exe Token: SeIncBasePriorityPrivilege 2304 New order.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2060 2304 New order.exe 87 PID 2304 wrote to memory of 2060 2304 New order.exe 87 PID 2304 wrote to memory of 2060 2304 New order.exe 87 PID 2304 wrote to memory of 3520 2304 New order.exe 89 PID 2304 wrote to memory of 3520 2304 New order.exe 89 PID 2304 wrote to memory of 3520 2304 New order.exe 89 PID 3520 wrote to memory of 856 3520 cmd.exe 91 PID 3520 wrote to memory of 856 3520 cmd.exe 91 PID 3520 wrote to memory of 856 3520 cmd.exe 91 PID 2304 wrote to memory of 3424 2304 New order.exe 92 PID 2304 wrote to memory of 3424 2304 New order.exe 92 PID 2304 wrote to memory of 3424 2304 New order.exe 92 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94 PID 2304 wrote to memory of 2972 2304 New order.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/New order.exe" "%temp%\FolderN\name.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 3523⤵
- Program crash
PID:2744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2972 -ip 29721⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD59df25a599697716759c0183e3284f8aa
SHA1405af3516b660318f006c16b2829adf0ec8e7d14
SHA256c4493204c066c17704b19dfa5c6fa3f55d32b010f5dc97ac04bbe3e3dfd7924f
SHA512e13a74ee635eea2c77ed1e4b7b8074de3f87e530a20ee1ec3763933e915621adcdf3c057d6b5e19e80d1ffed776482a47b08e4b996d2f6f0c981fac86e109f27
-
Filesize
89KB
MD584c42d0f2c1ae761bef884638bc1eacd
SHA14353881e7f4e9c7610f4e0489183b55bb58bb574
SHA256331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3
SHA51243c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87