Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 06:44
Behavioral task
behavioral1
Sample
3b41fb9385c0ac13fc08f3fda2098ac0N.exe
Resource
win7-20240729-en
General
-
Target
3b41fb9385c0ac13fc08f3fda2098ac0N.exe
-
Size
118KB
-
MD5
3b41fb9385c0ac13fc08f3fda2098ac0
-
SHA1
979c54b5e2d8afec33bc69ffb7a35a81a14264c8
-
SHA256
878d2d7e6bc21b888be0c88716d0457fbb224f3d27263be509180aaf8aa4f611
-
SHA512
d54d1109c7689c2867d4c8bb41667005717c36404e094316f9dc35a7810561867588d10f5da303656e087e76de5e0f9996b47c24f6f1b2e8128d36bb5ae280e8
-
SSDEEP
3072:M+z7JXnrdFzp886+RMPy5fWMwdWRgjnahKoutjKI7ehMx:rz75nrz286+RMaLVRgjahKoS
Malware Config
Extracted
netwire
imemerit.servehttp.com:3360
-
activex_autorun
true
-
activex_key
{I78G8V27-88UF-2L1T-8064-2S8723OVASE8}
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
TIrKHSHH
-
offline_keylogger
true
-
password
`+8n0x<gT)\"Lu5"'A`c?$H="
-
registry_autorun
true
-
startup_name
FirstRowAli
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2844-81-0x0000000000400000-0x000000000041A000-memory.dmp netwire behavioral1/memory/2844-89-0x0000000000400000-0x000000000041A000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
pid Process 2788 FirstRow.pif 852 FirstRow.pif 2392 FirstRow.pif -
Loads dropped DLL 5 IoCs
pid Process 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe -
resource yara_rule behavioral1/memory/3036-0-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/3036-4-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/3036-5-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2280-7-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2256-14-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2256-13-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2256-11-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2280-10-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2280-9-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/3036-16-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/files/0x00340000000195fd-36.dat upx behavioral1/memory/2788-47-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2256-44-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2280-48-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2280-49-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2788-51-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2844-79-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2844-78-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2844-76-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2844-81-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2788-80-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2392-84-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/852-83-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2844-89-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2280-100-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2280-108-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3036 set thread context of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 set thread context of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 2788 set thread context of 852 2788 FirstRow.pif 37 PID 2788 set thread context of 2392 2788 FirstRow.pif 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b41fb9385c0ac13fc08f3fda2098ac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b41fb9385c0ac13fc08f3fda2098ac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b41fb9385c0ac13fc08f3fda2098ac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 1384 ipconfig.exe 2772 ipconfig.exe 2924 ipconfig.exe 2496 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2392 FirstRow.pif -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 2788 FirstRow.pif 852 FirstRow.pif 2392 FirstRow.pif -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1384 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 29 PID 3036 wrote to memory of 1384 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 29 PID 3036 wrote to memory of 1384 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 29 PID 3036 wrote to memory of 1384 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 29 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2280 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 30 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 3036 wrote to memory of 2256 3036 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 32 PID 2280 wrote to memory of 2772 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 33 PID 2280 wrote to memory of 2772 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 33 PID 2280 wrote to memory of 2772 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 33 PID 2280 wrote to memory of 2772 2280 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 33 PID 2256 wrote to memory of 2788 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 35 PID 2256 wrote to memory of 2788 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 35 PID 2256 wrote to memory of 2788 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 35 PID 2256 wrote to memory of 2788 2256 3b41fb9385c0ac13fc08f3fda2098ac0N.exe 35 PID 2788 wrote to memory of 2924 2788 FirstRow.pif 36 PID 2788 wrote to memory of 2924 2788 FirstRow.pif 36 PID 2788 wrote to memory of 2924 2788 FirstRow.pif 36 PID 2788 wrote to memory of 2924 2788 FirstRow.pif 36 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 852 2788 FirstRow.pif 37 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 2788 wrote to memory of 2392 2788 FirstRow.pif 39 PID 852 wrote to memory of 2496 852 FirstRow.pif 40 PID 852 wrote to memory of 2496 852 FirstRow.pif 40 PID 852 wrote to memory of 2496 852 FirstRow.pif 40 PID 852 wrote to memory of 2496 852 FirstRow.pif 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"C:\Users\Admin\AppData\Local\Temp\3b41fb9385c0ac13fc08f3fda2098ac0N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2496
-
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe"5⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BTLRY.bat" "6⤵PID:2792
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "UpdateAliAim" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FirstRow.pif" /f7⤵PID:2200
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵PID:2844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD5f36ef4e2bfb399e9159d71c0806dc34f
SHA19ce20868ec14cabf37d77a1995b1399ebf40681d
SHA25699a012606942fe84a0ed1b09c60ef765cef48e4ba317b3a71595b300ae531cc2
SHA512ad7cd152f2b8f04aeee6838ccb2cc10675f289f0e4fd0e6175dace10a062655df1ec2a8d5e80ba65e5d6d0237311c91b0fce54c16e7576dc38b3399abc304b0b
-
Filesize
118KB
MD52cc98992478c9688ccfd9e130c16bd59
SHA1f200987192c510bdef382472a90278cb3805672f
SHA25695c9d6fcd9241052b5664d0df9dc0071f3847b37940fa0bb15f85d6daac4072d
SHA512c04de54ace172b7fc619da68af29f67623bd0f96d679864d0f6950a5a4c680221ee0a2d263e40a133fac9d9d46448233bb8fb9b3bfc615d029faa6611614c7f6