Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 16:44

General

  • Target

    EMV Writer Reader Software v8.exe

  • Size

    1.3MB

  • MD5

    f368225b07c15a58fc20c022b5d67ac7

  • SHA1

    0b91bffa3098fc586516a08c10a641c0f01a4337

  • SHA256

    e146c7e9223d84f76c59a0979facb49a347bb1b1427df98334a22b348bb624cd

  • SHA512

    678de6e96ba0caf0daf6e00c7da37018cbcb3cf0bd7384e7a1a21e0d23e4a0bda3b42adaae38e037e61c0e53d40db53273b98da305a9149fe69111dea0199fb6

  • SSDEEP

    24576:gRmJk9oQrilOIz+yMxPaknyxaKwdGyR/iOcYs1PtGaGw4o:ZJwoQryTtMxPaksa91RKHbUS

Malware Config

Extracted

Family

netwire

C2

teamviewer.ddns.net:3360

local.cable-modem.org:3360

local-cable.duckdns.org:3360

Attributes
  • activex_autorun

    true

  • activex_key

    {I428F72B-17T1-3YB6-KVXD-ED316JPXN378}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    mypesse

  • install_path

    %AppData%\Onedrivel\Prevhostwin10.exe

  • keylogger_dir

    %AppData%\systemprev\

  • lock_executable

    false

  • mutex

    nSOFwQuC

  • offline_keylogger

    true

  • password

    memek

  • registry_autorun

    true

  • startup_name

    Microsft@operati

  • use_mutex

    true

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe
    "C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Roaming\Prevhosti32.exe
      C:\Users\Admin\AppData\Roaming/Prevhosti32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Users\Admin\AppData\Roaming\Prevhosti32.exe
        "C:\Users\Admin\AppData\Roaming\Prevhosti32.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3640
        • C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe
          "C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe
            "C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1948
    • C:\Users\Admin\AppData\Local\Temp\v81.exe
      C:\Users\Admin\AppData\Local\Temp/v81.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\v81.exe

    Filesize

    118KB

    MD5

    c9a3ccf95369f53cd448fac94ff4e3b8

    SHA1

    48131cd75821aad01ace71277206b7c6d7d4925c

    SHA256

    dc32698c13de42e87913c6d90939186a56ca4586e0397df52ed85e47443ceef4

    SHA512

    eeec3a8dd76cee4a1d774f7f34766742c6b92d833f8a92adb251cb618924935d3fbaf5c386b7c5291489ad805d3233dfd8b41aaafd73851aa9b410b45ff86e3a

  • C:\Users\Admin\AppData\Roaming\Prevhosti32.exe

    Filesize

    952KB

    MD5

    36327d32f1978968985e132470a0ef8b

    SHA1

    2edb5e5e682f2efb74c0d43c5b83d839a36fba49

    SHA256

    a21b113d0f6bfc37895210a1b1df396133d0f4f35076bdab714750b20037ea92

    SHA512

    e57d2a584347d177a590ea85f4cf8a6abd3d51e31e89044e5e96be9cb5be4b5ebf99edf8f5afe1940982e7e778c36a02a742599ef3a14c5125ca1ec3cef65472

  • memory/1948-45-0x00000000000C0000-0x00000000000F3000-memory.dmp

    Filesize

    204KB

  • memory/3640-26-0x00000000000C0000-0x00000000000F3000-memory.dmp

    Filesize

    204KB

  • memory/3640-32-0x00000000000C0000-0x00000000000F3000-memory.dmp

    Filesize

    204KB

  • memory/3640-29-0x00000000000C0000-0x00000000000F3000-memory.dmp

    Filesize

    204KB

  • memory/4472-18-0x00000000049D0000-0x0000000004A6C000-memory.dmp

    Filesize

    624KB

  • memory/4472-21-0x0000000004AC0000-0x0000000004ACA000-memory.dmp

    Filesize

    40KB

  • memory/4472-22-0x0000000004D30000-0x0000000004D86000-memory.dmp

    Filesize

    344KB

  • memory/4472-23-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/4472-24-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/4472-25-0x000000007448E000-0x000000007448F000-memory.dmp

    Filesize

    4KB

  • memory/4472-20-0x0000000004BA0000-0x0000000004C32000-memory.dmp

    Filesize

    584KB

  • memory/4472-19-0x00000000050B0000-0x0000000005654000-memory.dmp

    Filesize

    5.6MB

  • memory/4472-17-0x0000000000150000-0x0000000000176000-memory.dmp

    Filesize

    152KB

  • memory/4472-31-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/4472-16-0x000000007448E000-0x000000007448F000-memory.dmp

    Filesize

    4KB