Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe
Resource
win7-20240903-en
General
-
Target
2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe
-
Size
564KB
-
MD5
2ef1d463ba6c2a421e1323e90caae956
-
SHA1
8c6425a42e97e62c40babe8178b88ee590ebed18
-
SHA256
68c5f25c669744b71a292628126edfc824386cf354a442d63bcbcc2c0514cd49
-
SHA512
f01a9ac726b94b777555855b3d4410c06fa46282caad7ee145a36983b4f9c6f70cc6163925d762b5d2568e1b4b2a0ed3ab6f9ca1bebdfc0b9d32e7c8d2e376bb
-
SSDEEP
12288:lwkbfcjNvSk4ebXSHNzhibPS9jxYnovshuqfXcg8tZPzgf:lwfN68SHOS9tk2g8rcf
Malware Config
Extracted
netwire
151.80.8.32:9865
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\mshst.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
7FP6nBsZx!)@^*6nB
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2528-7-0x0000000000400000-0x0000000000493000-memory.dmp netwire behavioral1/memory/2528-13-0x0000000000400000-0x0000000000493000-memory.dmp netwire behavioral1/memory/2520-19-0x0000000000400000-0x0000000000493000-memory.dmp netwire behavioral1/memory/2520-20-0x0000000000400000-0x0000000000493000-memory.dmp netwire -
Deletes itself 1 IoCs
pid Process 2520 mshst.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 mshst.exe -
Loads dropped DLL 1 IoCs
pid Process 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe 2520 mshst.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2520 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe 31 PID 2528 wrote to memory of 2520 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe 31 PID 2528 wrote to memory of 2520 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe 31 PID 2528 wrote to memory of 2520 2528 2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Install\mshst.exe-m "C:\Users\Admin\AppData\Local\Temp\2024-10-09_2ef1d463ba6c2a421e1323e90caae956_magniber.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD52ef1d463ba6c2a421e1323e90caae956
SHA18c6425a42e97e62c40babe8178b88ee590ebed18
SHA25668c5f25c669744b71a292628126edfc824386cf354a442d63bcbcc2c0514cd49
SHA512f01a9ac726b94b777555855b3d4410c06fa46282caad7ee145a36983b4f9c6f70cc6163925d762b5d2568e1b4b2a0ed3ab6f9ca1bebdfc0b9d32e7c8d2e376bb