Analysis

  • max time kernel
    73s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 17:52

General

  • Target

    81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe

  • Size

    440KB

  • MD5

    53fd837cce4527d93c5d4cf91f822155

  • SHA1

    59a5ecd6bc055784f05dbd7aa099a125bb9a0263

  • SHA256

    81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67

  • SHA512

    877c9954e9de9f7afef2498999e067e8e41dfbeaff1bf878f1d5654153ef6afe99c3d0db5b75b254faaa5ad2517f53aacd2f9b84dbf85ad90e305cb13176fb0e

  • SSDEEP

    6144:YFb5HOviqia9rwJYJkh8qEnwoHo7YDh/GdTUpdTxk6zsVN3JRjN3Jw:g5HOvsSr8YJkPEw5ZT4d11cN3JRpJw

Malware Config

Extracted

Family

netwire

C2

vad.invvipbooknowreverse.vladimir.ru:8079

vlad.securefoodlinkdownload.kz:8078

vlad.racordvasdems.su:8077

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    NossSs-%Rand%

  • keylogger_dir

    %AppData%\Dobe\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    19891989

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 6 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops file in System32 directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe
    "C:\Users\Admin\AppData\Local\Temp\81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 536
      2⤵
      • Program crash
      PID:4504
    • C:\Windows\SysWOW64\calc.exe
      calc.exe
      2⤵
      • Drops file in System32 directory
      PID:1084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1460 -ip 1460
    1⤵
      PID:2496
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58bedcfd-2c1e-423f-b1e6-c7e7cc59d122} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" gpu
          3⤵
            PID:4556
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2372 -parentBuildID 20240401114208 -prefsHandle 2364 -prefMapHandle 2360 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22a1dd61-f940-45dd-8ea9-dce2e6b8420d} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" socket
            3⤵
            • Checks processor information in registry
            PID:4936
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3336 -childID 1 -isForBrowser -prefsHandle 3328 -prefMapHandle 3324 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63076c0d-c2ae-4bb9-9dcd-684530a591cc} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
            3⤵
              PID:2056
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 2 -isForBrowser -prefsHandle 3224 -prefMapHandle 3272 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e773135-5369-4c4c-81d0-f234988eae63} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
              3⤵
                PID:536
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4872 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4852 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20168763-6315-497d-9dbf-6c4900ee5070} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" utility
                3⤵
                • Checks processor information in registry
                PID:5336
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:412
            • C:\Users\Admin\AppData\Local\Temp\81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe
              "C:\Users\Admin\AppData\Local\Temp\81f623714de0a3dfb0a537b3be6e5fa52c23e4c530ef0f4bc3c38dc988f44d67.exe"
              1⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4376
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 228
                2⤵
                • Program crash
                PID:3964
              • C:\Windows\SysWOW64\calc.exe
                calc.exe
                2⤵
                • Drops file in System32 directory
                PID:2276
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 4376
              1⤵
                PID:2324

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\activity-stream.discovery_stream.json

                Filesize

                32KB

                MD5

                1afa72cd9c1196fdf6ab919239c4c1f0

                SHA1

                de30b239d625d060d2ffdfd6b49cfc612e3acc55

                SHA256

                45f8965f8ca1e39f60f59ceeb9150fbf1609f774f374a66474eb014b70c97e4f

                SHA512

                1a7840cc4b1ff7ec5926736eb375ee665c0c02db1373aab8b4f81c756639fcd30ffe9017c6c9f7d97913a55b53c2535453003c2a9858be0664fa3127a50bb3d9

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\db\data.safe.tmp

                Filesize

                5KB

                MD5

                ecfaf732816f9123d73945c6ef2f8db7

                SHA1

                111453fa8e52a2c603c1f8bcf54af67299f89847

                SHA256

                dcc83878618c5b7d7eb995032f92b6c8ef0303d88d5841eb8488a95df5ef5b0e

                SHA512

                ac9f916fbcaa20996114ade5798f3f2c6c41602223350ce8bd1374656bb3aa0c2115d25019c27ab7d1082684cd898870c81d957f17c10b18661500388977dd1b

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\0ae40a1f-9043-4b86-9e48-bb8360d7c025

                Filesize

                982B

                MD5

                5a1134f1ff3ab349b83156dfb806df50

                SHA1

                f93820b5f90310251a801358d45386d3e1866d39

                SHA256

                9c31728b6116325cddfb25152d5084ab80f0063472e5f7640908b40c403b83b2

                SHA512

                2c27d82348232449cf678cba5a91a7344ba4a59420745ead4b0613df6de8ecc18fd2009b864e67fff4dbb230a3bb700b63d292ffe817326e826e9a55a6063928

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\2707d2a2-ed61-4749-99e8-a6e1486751ec

                Filesize

                26KB

                MD5

                d1fb9308afe509e8302cdc5f4697dbf4

                SHA1

                a916fdd5ed426b01a81969f31b7ccb80f2bb6a8d

                SHA256

                48196b251f27b9ce182765d4c815e61549b9a75338b7c909437ca0c0972e1865

                SHA512

                bdb96715abf42c164678754f0f930aabaa009578b54f3f91b8c60356ceb2e7e193c9b73cbdc38b57532dc31ece144f02b92eb288cb893c54298d1da8a70a0395

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\2e33e3e1-140c-48f6-bf63-3c17725c4c2a

                Filesize

                671B

                MD5

                524b3352b1fe1c10cbcfeafc0b259ae8

                SHA1

                fe60e051775d8dffd216bb33d6f0838c6a7bd09c

                SHA256

                6b00f8fb33db6e8410a2f9b820f3bb35e121b14cba37a387fb8fb2c3ad40fc43

                SHA512

                ea708834e05c011f79794bee3762b38ef837fdd0eb8840284aa2dc9a742bda3c10e7c775029eae7eea515a9ce982b682a58d0d7f1d0eef627ed35ede50ee5c20

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\prefs.js

                Filesize

                11KB

                MD5

                2a63010f836749a19b73c241d28aa497

                SHA1

                c71abebc74aa8670dccf076ebce701b86eeb059c

                SHA256

                6f9a61c5147029ce87ca802ff2df94b9e81fe0d96a03521638dc16885fbd79dd

                SHA512

                ff9eb0a9d2ca17938c0442c58868f816bc2b2f2bfbd564716d25e4c1eb36c508e790b3e4b42309dafa138f643c4530546e9c534838d4d2d55b27fb148c9396bb

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\prefs.js

                Filesize

                11KB

                MD5

                79daf55b3a71ab6cd56fc48a9dc7973c

                SHA1

                3d7c8d970d378e82c5b45fa6f7408ee7ba3ec40b

                SHA256

                0a11b921ff9fe798c272074cb0ef8b6446d8f1cb34955f3eaad3d09097b32872

                SHA512

                bd4def9e52299ccb3803bbc6419f5cde139793933043384d339feee7ac1343835b66bcc703116e52606e36b0d793b58efea3957392993a7b64800039870c504a

              • C:\Windows\SysWOW64\.Identifier

                Filesize

                68B

                MD5

                e224a31796ca0a878037bed0bdd1e691

                SHA1

                1564905c8237ac30ff529112b144c80ea45b6612

                SHA256

                f41ba0fa57e4e41d630331954938726727fb76273206d4b6fe444ff633695e85

                SHA512

                96e46175ae2445c9882c1ecb25d55a5c1623368246cd0268764aa1ea86e889c75fbc8fae1a1516615e6743d3b73875480e58e1c8faa8c5601eef548d3b6b6148

              • memory/1084-3-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/1084-6-0x0000000077012000-0x0000000077013000-memory.dmp

                Filesize

                4KB

              • memory/1084-7-0x0000000000A00000-0x0000000000A01000-memory.dmp

                Filesize

                4KB

              • memory/1084-8-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/1084-10-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/1084-2-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/1460-0-0x00000000025B0000-0x000000000262B000-memory.dmp

                Filesize

                492KB

              • memory/1460-1-0x0000000077012000-0x0000000077013000-memory.dmp

                Filesize

                4KB

              • memory/1460-9-0x00000000025B0000-0x000000000262B000-memory.dmp

                Filesize

                492KB

              • memory/2276-345-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/2276-343-0x0000000077012000-0x0000000077013000-memory.dmp

                Filesize

                4KB

              • memory/2276-346-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/2276-347-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/4376-340-0x0000000000400000-0x0000000000471000-memory.dmp

                Filesize

                452KB