Overview
overview
10Static
static
3333e76fb70...0N.exe
windows7-x64
10333e76fb70...0N.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3General
-
Target
333e76fb70bd934d7360c555ac40a370N.exe
-
Size
188KB
-
Sample
240829-p91zlssgjd
-
MD5
333e76fb70bd934d7360c555ac40a370
-
SHA1
3dbd4e9ecf56efc70515746b51af447191e32239
-
SHA256
f59268ac976b85521c5e2279d14f57a8d6b3926d710b1853963db0cbd6c4d3c2
-
SHA512
7e8b9f101b9fa326ea68519da2991d1717a968d7ed46418efe331d1c4067d10edaec7746a2158c749276e1c8fbfe926500342037e74fbab4e3a4a711af0a77a5
-
SSDEEP
3072:o030XCIscLlj+cM45KzxKwrKdvZz+7DzVX4++RC7AUBTBqzqdTFzILwrK:oje/NGv1+T2PDUCmdTFzIc
Static task
static1
Behavioral task
behavioral1
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
127.0.0.1:3380
manpower123.sytes.net:3380
-
activex_autorun
true
-
activex_key
{SU60632U-NH5E-B175-1B86-J7K6RBN22VI8}
-
copy_executable
true
-
delete_original
true
-
host_id
ID1
-
install_path
%AppData%\Install\1day
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
cPSdeemG
-
offline_keylogger
true
-
password
c5dcq70o
-
registry_autorun
true
-
startup_name
Java
-
use_mutex
true
Targets
-
-
Target
333e76fb70bd934d7360c555ac40a370N.exe
-
Size
188KB
-
MD5
333e76fb70bd934d7360c555ac40a370
-
SHA1
3dbd4e9ecf56efc70515746b51af447191e32239
-
SHA256
f59268ac976b85521c5e2279d14f57a8d6b3926d710b1853963db0cbd6c4d3c2
-
SHA512
7e8b9f101b9fa326ea68519da2991d1717a968d7ed46418efe331d1c4067d10edaec7746a2158c749276e1c8fbfe926500342037e74fbab4e3a4a711af0a77a5
-
SSDEEP
3072:o030XCIscLlj+cM45KzxKwrKdvZz+7DzVX4++RC7AUBTBqzqdTFzILwrK:oje/NGv1+T2PDUCmdTFzIc
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
ea60c7bd5edd6048601729bd31362c16
-
SHA1
6e6919d969eb61a141595014395b6c3f44139073
-
SHA256
4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39
-
SHA512
f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993
-
SSDEEP
48:im1nEhqneMPUptuMMNvimk2BAZuMTRCpYEvJdUJvR0J6of5dwe:F1jpl9NLBAZuYtR0xd
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
55a26d7800446f1373056064c64c3ce8
-
SHA1
80256857e9a0a9c8897923b717f3435295a76002
-
SHA256
904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8
-
SHA512
04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b
-
SSDEEP
192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
ee449b0adce56fbfa433b0239f3f81be
-
SHA1
ec1e4f9815ea592a3f19b1fe473329b8ddfa201c
-
SHA256
c1cc3aa4326e83a73a778dee0cf9afcc03a6bafb0a32cea791a27eb9c2288985
-
SHA512
22fb25bc7628946213e6e970a865d3fbd50d12ce559c37d6848a82c28fa6be09fedffc3b87d5aea8dcfe8dfc4e0f129d9f02e32dae764b8e6a08332b42386686
-
SSDEEP
96:oCqZ4zC5RH3cXX1LlYlRowycxM2DjDf3GEst+Nt+jvDYx4iqndYHnxss:oCq+CP3uKrpyREs06Yx+dGn
Score3/10 -
-
-
Target
Uninstall.exe
-
Size
57KB
-
MD5
8d67546632276e864ed86f26919d8e0e
-
SHA1
77ba03a00c7229618ef86fde09e83125a67f7578
-
SHA256
4dc37f2bb5ad34df5da0aa71d7938ce3638ef63e278ea117115371acc1fa7614
-
SHA512
3168b58ff1d10a79f64983889e6401fc7611161f1b79f22d77b81a8b8bce8f473169389daf323f00367147b88a8c9901bfeaf022f3527f9c759673743a20cde9
-
SSDEEP
1536:o02Wf0K2CImbrBwiALljslcUgdLeAyNxdxVpl2LCOKm:o030XCIscLlj+cUceAY/wrKm
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
ea60c7bd5edd6048601729bd31362c16
-
SHA1
6e6919d969eb61a141595014395b6c3f44139073
-
SHA256
4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39
-
SHA512
f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993
-
SSDEEP
48:im1nEhqneMPUptuMMNvimk2BAZuMTRCpYEvJdUJvR0J6of5dwe:F1jpl9NLBAZuYtR0xd
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
55a26d7800446f1373056064c64c3ce8
-
SHA1
80256857e9a0a9c8897923b717f3435295a76002
-
SHA256
904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8
-
SHA512
04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b
-
SSDEEP
192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1