Resubmissions

14-12-2024 19:23

241214-x3vs1s1qbz 10

12-12-2024 19:35

241212-yaxycaxkaj 10

Analysis

  • max time kernel
    49s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 19:35

General

  • Target

    f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe

  • Size

    584KB

  • MD5

    c9e985c561be0dd05c190dc70ae3518e

  • SHA1

    ffbcb080efbbd36ebb9f81eded9e63c7f66cab9f

  • SHA256

    f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b

  • SHA512

    f1b10f5bc7bb52bf70a8e083a45a823379b1b4e0ca42e7378a07a06d4b3b8346c4dfbc95575534df9b18445eb5d56a6302d07cd86b6017f422d99dccbfec1ebb

  • SSDEEP

    12288:AgIdCFdSZHZVaeSESmqf6G+SqnTrrEsYGre4YzHix:HYYSZ5VrS3xqTrPFr0c

Malware Config

Extracted

Family

netwire

C2

38.132.124.156:1199

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    12345

  • registry_autorun

    true

  • startup_name

    ronies

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe
    "C:\Users\Admin\AppData\Local\Temp\f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\service.exe
      "C:\Users\Admin\AppData\Local\Temp\service.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRgFfvmwT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC11D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:920
      • C:\Users\Admin\AppData\Local\Temp\service.exe
        "C:\Users\Admin\AppData\Local\Temp\service.exe"
        3⤵
        • Executes dropped EXE
        PID:1956
      • C:\Users\Admin\AppData\Local\Temp\service.exe
        "C:\Users\Admin\AppData\Local\Temp\service.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4496
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\CPA accountant COVID_19 pandemic relief (20,000$).docx" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CPA accountant COVID_19 pandemic relief (20,000$).docx

    Filesize

    68KB

    MD5

    f5338a212a363459b7354fd8091d5501

    SHA1

    d5f79a7e7a664147f71dc58988462c51f489e16b

    SHA256

    9a62f34e8c12aeed7a693399f5d17676c9af7b50865f160fc7eb4d709c252583

    SHA512

    e033137c54ce92fec4d51f79d2cc79e6d6335060a1ba1f5ad0d30833749034c0c2c750e9cea9b654b1c36ea6cf67adddb08c0c165f46d75530cf7af1c1d81ab0

  • C:\Users\Admin\AppData\Local\Temp\TCD43E4.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\service.exe

    Filesize

    311KB

    MD5

    a69b9cf282c900d55cd7452e039daf41

    SHA1

    0ea752ca500e4b9df336cb4438e7804d3b0186ad

    SHA256

    3e2526d2955b6709532d1a16a221882619690292dce1527a3399a8d704a4c79d

    SHA512

    caa067276632186c0ef2e9bf821ad64aff680645a4d0436dac2cefa7aa99feb76cb6a52e672c325ba51783635388f32cd64c2a69f0aa52c1f8f37ab4d29d1765

  • C:\Users\Admin\AppData\Local\Temp\tmpC11D.tmp

    Filesize

    1KB

    MD5

    326dab4f7f3dc8888cafe0a106c0877a

    SHA1

    ffd62704090198b36fc798f0af9864cb884698e3

    SHA256

    ef5c1cdd926b05ed525f9690e23450d14468ca3a4cf8fba419efc1b0b82eb154

    SHA512

    3c2ee46c98918131a6cc7cf6b996ee5ed4ff151d146eaeb3162eee3bd1c6543a8202d4aee0d97c51c97fe7c5ae1015e97a9f4d56e9e992f4b1367ac76742b459

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    0f18a888d090ad99bf664ebf11a11291

    SHA1

    a979a149c9cc767318df56d57593dc61c57859b9

    SHA256

    a273f62c884e5a8e6e5a76340c7a4d92e634e765e8909582db228632bfd9cfa5

    SHA512

    54449ffbbdfcab2127a1ef09d5cc84d3307e56747941c463e7457fba910dcba7d36ec3e93887944940720cbfb42ec87e8cf3c3aa26f4389d6096a53b4c805bab

  • memory/2932-18-0x0000000072F80000-0x0000000073531000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-53-0x0000000072F80000-0x0000000073531000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-15-0x0000000072F82000-0x0000000072F83000-memory.dmp

    Filesize

    4KB

  • memory/2932-19-0x0000000072F80000-0x0000000073531000-memory.dmp

    Filesize

    5.7MB

  • memory/4496-47-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4496-49-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4496-51-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4888-34-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-25-0x00007FF84024D000-0x00007FF84024E000-memory.dmp

    Filesize

    4KB

  • memory/4888-33-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-32-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-35-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-28-0x00007FF7FDD30000-0x00007FF7FDD40000-memory.dmp

    Filesize

    64KB

  • memory/4888-42-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-44-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-43-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-27-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-26-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-29-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-21-0x00007FF800230000-0x00007FF800240000-memory.dmp

    Filesize

    64KB

  • memory/4888-23-0x00007FF800230000-0x00007FF800240000-memory.dmp

    Filesize

    64KB

  • memory/4888-41-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-40-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-31-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-30-0x00007FF7FDD30000-0x00007FF7FDD40000-memory.dmp

    Filesize

    64KB

  • memory/4888-24-0x00007FF800230000-0x00007FF800240000-memory.dmp

    Filesize

    64KB

  • memory/4888-85-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-89-0x00007FF8401B0000-0x00007FF8403A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-22-0x00007FF800230000-0x00007FF800240000-memory.dmp

    Filesize

    64KB

  • memory/4888-20-0x00007FF800230000-0x00007FF800240000-memory.dmp

    Filesize

    64KB