Overview
overview
10Static
static
10574b348f67...76.exe
windows7-x64
10574b348f67...76.exe
windows10-2004-x64
106b4401690c...6f.exe
windows7-x64
106b4401690c...6f.exe
windows10-2004-x64
10843c5f7a81...35.exe
windows7-x64
10843c5f7a81...35.exe
windows10-2004-x64
10bffb4b88ef...df.exe
windows7-x64
10bffb4b88ef...df.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 04:41
Behavioral task
behavioral1
Sample
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
6b4401690cb0a07ee98ff3c5fc351b20c6e0a4ba7474c6ad858e5dc69a60b36f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
6b4401690cb0a07ee98ff3c5fc351b20c6e0a4ba7474c6ad858e5dc69a60b36f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
843c5f7a818681e3df212c80515cdce0bd56c6e178412736b8a22b15ebb35435.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
843c5f7a818681e3df212c80515cdce0bd56c6e178412736b8a22b15ebb35435.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe
Resource
win7-20240903-en
General
-
Target
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe
-
Size
160KB
-
MD5
21c97621d2f2374fa75d71282c566203
-
SHA1
96c38ca646682bc8520059402c3b3fc976e7481b
-
SHA256
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476
-
SHA512
1a32a419f68183ac683c7c4e34bf7ba57e6db58131de714428ff672ef9786c818d2215fcf86841cb2e007b53a85921a450296e53e7bcd35c4a74e0c6b2b105fd
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvefYMjMqqDvFf:jOTcK+NrRioGHlz8rz0i/MzQqqDvFf
Malware Config
Extracted
netwire
nwire733.duckdns.org:7922
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-EaWkOe
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
souAjTlI
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2644-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe