Analysis
-
max time kernel
1794s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 13:09
Static task
static1
General
-
Target
Setup.exe
-
Size
2.5MB
-
MD5
567d3e1a12c51c3fdeeabd8190c121f2
-
SHA1
c3b3f202e44fd79f08409dd9c36307d4a4fcff1e
-
SHA256
44b0198f89b06283a6383adf6b581efe1f28c948b099c0d9cdab9f9068a3c8db
-
SHA512
7d0964f0dd322ee2fd3085a4dcec495197726a8a819e19c2651b72994774cf3d475d46cecc12dc336bed34902d0475e0e20b2596012387351c785719be8a98b8
-
SSDEEP
3072:FpWz3jKwH4GW9zubqCuhEFT6PwDCLq9jg7/XjA28HKSXPKHSEVKjIyDG4QXeaAs:zW
Malware Config
Extracted
netwire
r00tshit.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3004-17-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/3004-19-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/3004-22-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 4144 egHpQulVHBME.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\avas64 = "C:\\Users\\Admin\\avas64.exe" Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 3004 808 Setup.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egHpQulVHBME.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 808 wrote to memory of 4144 808 Setup.exe 87 PID 808 wrote to memory of 4144 808 Setup.exe 87 PID 808 wrote to memory of 4144 808 Setup.exe 87 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88 PID 808 wrote to memory of 3004 808 Setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Roaming\egHpQulVHBME.exe"C:\Users\Admin\AppData\Roaming\egHpQulVHBME.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD56453b1d831cc4b4708476dd82d352255
SHA179c7dcb41cf90460b3fb7be106df930875a8226a
SHA2565468963e71c183162cb01be461b777023968cefb9974e848e5fccf28bbce0a17
SHA5126e4315b042029d0a487bc1868d0ae7e3341605eada16d2ed0e0257a28be7c609cf7dfc63d245505d2abfa73c05b0cd1ef84b0a0d5b3b63f0bd28fd59f99dadc5