Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
General
-
Target
Setup.exe
-
Size
2.5MB
-
MD5
567d3e1a12c51c3fdeeabd8190c121f2
-
SHA1
c3b3f202e44fd79f08409dd9c36307d4a4fcff1e
-
SHA256
44b0198f89b06283a6383adf6b581efe1f28c948b099c0d9cdab9f9068a3c8db
-
SHA512
7d0964f0dd322ee2fd3085a4dcec495197726a8a819e19c2651b72994774cf3d475d46cecc12dc336bed34902d0475e0e20b2596012387351c785719be8a98b8
-
SSDEEP
3072:FpWz3jKwH4GW9zubqCuhEFT6PwDCLq9jg7/XjA28HKSXPKHSEVKjIyDG4QXeaAs:zW
Malware Config
Extracted
netwire
r00tshit.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
resource yara_rule behavioral1/memory/2116-18-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-27-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-25-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-28-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-22-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-20-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2116-30-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2360 egHpQulVHBME.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 Setup.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\avas64 = "C:\\Users\\Admin\\avas64.exe" Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2116 2336 Setup.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egHpQulVHBME.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2360 2336 Setup.exe 30 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31 PID 2336 wrote to memory of 2116 2336 Setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\egHpQulVHBME.exe"C:\Users\Admin\AppData\Roaming\egHpQulVHBME.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD56453b1d831cc4b4708476dd82d352255
SHA179c7dcb41cf90460b3fb7be106df930875a8226a
SHA2565468963e71c183162cb01be461b777023968cefb9974e848e5fccf28bbce0a17
SHA5126e4315b042029d0a487bc1868d0ae7e3341605eada16d2ed0e0257a28be7c609cf7dfc63d245505d2abfa73c05b0cd1ef84b0a0d5b3b63f0bd28fd59f99dadc5