Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 19:44
Behavioral task
behavioral1
Sample
Host.exe
Resource
win7-20240708-en
General
-
Target
Host.exe
-
Size
160KB
-
MD5
cf67f5a6456cb27efb88ec441c1b121b
-
SHA1
8bf4c0a06df97dba8ced5fdb504982c365044597
-
SHA256
f54b2f764ed7112c3a11adf056a54b8646f23093fbc52ce0e07a184f5dd69fcc
-
SHA512
117f55a6a3d5be6c186d71ff03064cde75d31f0859957b821d6de98b4208c24fc13aadfe60e2fe5f721360d7aff5451d016c38ef04592124af40baeb2333d8f7
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvJYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/JzQqqDvFf
Malware Config
Extracted
netwire
82.156.233.85:80
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
true
-
offline_keylogger
false
-
password
bupt
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b8b-4.dat netwire behavioral2/memory/3564-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3576-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Host.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3576 3564 Host.exe 82 PID 3564 wrote to memory of 3576 3564 Host.exe 82 PID 3564 wrote to memory of 3576 3564 Host.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\Host.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5cf67f5a6456cb27efb88ec441c1b121b
SHA18bf4c0a06df97dba8ced5fdb504982c365044597
SHA256f54b2f764ed7112c3a11adf056a54b8646f23093fbc52ce0e07a184f5dd69fcc
SHA512117f55a6a3d5be6c186d71ff03064cde75d31f0859957b821d6de98b4208c24fc13aadfe60e2fe5f721360d7aff5451d016c38ef04592124af40baeb2333d8f7