Analysis

  • max time kernel
    134s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 19:40

General

  • Target

    f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe

  • Size

    584KB

  • MD5

    c9e985c561be0dd05c190dc70ae3518e

  • SHA1

    ffbcb080efbbd36ebb9f81eded9e63c7f66cab9f

  • SHA256

    f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b

  • SHA512

    f1b10f5bc7bb52bf70a8e083a45a823379b1b4e0ca42e7378a07a06d4b3b8346c4dfbc95575534df9b18445eb5d56a6302d07cd86b6017f422d99dccbfec1ebb

  • SSDEEP

    12288:AgIdCFdSZHZVaeSESmqf6G+SqnTrrEsYGre4YzHix:HYYSZ5VrS3xqTrPFr0c

Malware Config

Extracted

Family

netwire

C2

38.132.124.156:1199

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    12345

  • registry_autorun

    true

  • startup_name

    ronies

  • use_mutex

    false

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe
    "C:\Users\Admin\AppData\Local\Temp\f9bf619a41a56cae6b8e6d5b3fb3d3afdd7976745dbe9cc7f90ba4dcadc35d9b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\service.exe
      "C:\Users\Admin\AppData\Local\Temp\service.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRgFfvmwT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7C44.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2880
      • C:\Users\Admin\AppData\Local\Temp\service.exe
        "C:\Users\Admin\AppData\Local\Temp\service.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4072
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\CPA accountant COVID_19 pandemic relief (20,000$).docx" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CPA accountant COVID_19 pandemic relief (20,000$).docx

    Filesize

    68KB

    MD5

    f5338a212a363459b7354fd8091d5501

    SHA1

    d5f79a7e7a664147f71dc58988462c51f489e16b

    SHA256

    9a62f34e8c12aeed7a693399f5d17676c9af7b50865f160fc7eb4d709c252583

    SHA512

    e033137c54ce92fec4d51f79d2cc79e6d6335060a1ba1f5ad0d30833749034c0c2c750e9cea9b654b1c36ea6cf67adddb08c0c165f46d75530cf7af1c1d81ab0

  • C:\Users\Admin\AppData\Local\Temp\TCDC04B.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\service.exe

    Filesize

    311KB

    MD5

    a69b9cf282c900d55cd7452e039daf41

    SHA1

    0ea752ca500e4b9df336cb4438e7804d3b0186ad

    SHA256

    3e2526d2955b6709532d1a16a221882619690292dce1527a3399a8d704a4c79d

    SHA512

    caa067276632186c0ef2e9bf821ad64aff680645a4d0436dac2cefa7aa99feb76cb6a52e672c325ba51783635388f32cd64c2a69f0aa52c1f8f37ab4d29d1765

  • C:\Users\Admin\AppData\Local\Temp\tmp7C44.tmp

    Filesize

    1KB

    MD5

    ad374ab9d349ce351952902cbbd55eeb

    SHA1

    d7a8d8d9517856653f593c5b8df0c196d693a750

    SHA256

    83cd421146b7a743b32278843cf95e2ffa091f51eb2c0f09b7d566e957fa610c

    SHA512

    08fd9b02b24253e98d2603604cba49173497b203e40880376ca0d510f9790889d4d6b85873cf8c4b0af44d78f497fda868fa6ba153aeadadd5b281b29a779d98

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1660-20-0x0000000073240000-0x00000000737F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1660-17-0x0000000073242000-0x0000000073243000-memory.dmp

    Filesize

    4KB

  • memory/1660-18-0x0000000073240000-0x00000000737F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1660-58-0x0000000073240000-0x00000000737F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4072-49-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4072-47-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4596-31-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-34-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-38-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-37-0x00007FFEAD130000-0x00007FFEAD140000-memory.dmp

    Filesize

    64KB

  • memory/4596-36-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-39-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-40-0x00007FFEAD130000-0x00007FFEAD140000-memory.dmp

    Filesize

    64KB

  • memory/4596-35-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-30-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-29-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-28-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-27-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-24-0x00007FFEAF190000-0x00007FFEAF1A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-32-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-19-0x00007FFEAF190000-0x00007FFEAF1A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-33-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-26-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-25-0x00007FFEAF190000-0x00007FFEAF1A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-22-0x00007FFEAF190000-0x00007FFEAF1A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-23-0x00007FFEAF190000-0x00007FFEAF1A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-82-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-83-0x00007FFEEF1AD000-0x00007FFEEF1AE000-memory.dmp

    Filesize

    4KB

  • memory/4596-84-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-85-0x00007FFEEF110000-0x00007FFEEF305000-memory.dmp

    Filesize

    2.0MB

  • memory/4596-21-0x00007FFEEF1AD000-0x00007FFEEF1AE000-memory.dmp

    Filesize

    4KB