Overview
overview
10Static
static
10574b348f67...76.exe
windows7-x64
10574b348f67...76.exe
windows10-2004-x64
106b4401690c...6f.exe
windows7-x64
106b4401690c...6f.exe
windows10-2004-x64
10843c5f7a81...35.exe
windows7-x64
10843c5f7a81...35.exe
windows10-2004-x64
10bffb4b88ef...df.exe
windows7-x64
10bffb4b88ef...df.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:41
Behavioral task
behavioral1
Sample
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
574b348f67921ce34f660afe2ff75d0538bd5ea203739a77479dba7f026f0476.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
6b4401690cb0a07ee98ff3c5fc351b20c6e0a4ba7474c6ad858e5dc69a60b36f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
6b4401690cb0a07ee98ff3c5fc351b20c6e0a4ba7474c6ad858e5dc69a60b36f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
843c5f7a818681e3df212c80515cdce0bd56c6e178412736b8a22b15ebb35435.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
843c5f7a818681e3df212c80515cdce0bd56c6e178412736b8a22b15ebb35435.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe
Resource
win7-20240903-en
General
-
Target
bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe
-
Size
82KB
-
MD5
a4a8a89ce20e6f60d67140336e0a53cc
-
SHA1
f8dd44e59ac4592637ceb48a386ecb7cb53b3d42
-
SHA256
bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df
-
SHA512
2da47070fb9c39d09e6b9c706d4c85d5eb3928cbfb6271856068a30aacb8b9dd6df6e0680f59e5c2c03f2ff1a3d680d8ccafccebc8337c6763e0907918b27503
-
SSDEEP
1536:ORC2p2bHgBjEAKsQHzIRiuoSL6EWCOSSUnEy9ZjBiVcUvnZjgf2c:O8bAuAfuIlHGEXTUqAcUBUuc
Malware Config
Extracted
netwire
nwire733.duckdns.org:7920
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
mkjcDhsG
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral7/files/0x0008000000015ccc-6.dat netwire behavioral7/memory/2280-21-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Executes dropped EXE 1 IoCs
pid Process 2280 nwire733.exe -
Loads dropped DLL 4 IoCs
pid Process 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwire733.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2240 WScript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2240 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 30 PID 3028 wrote to memory of 2240 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 30 PID 3028 wrote to memory of 2240 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 30 PID 3028 wrote to memory of 2240 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 30 PID 3028 wrote to memory of 2280 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 31 PID 3028 wrote to memory of 2280 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 31 PID 3028 wrote to memory of 2280 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 31 PID 3028 wrote to memory of 2280 3028 bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe"C:\Users\Admin\AppData\Local\Temp\bffb4b88ef53beb49ba2af08212870b203a29c7fcd1c8f02e0a905e71a8af6df.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Prevent windows from sleeping.vbs"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\nwire733.exe"C:\Users\Admin\AppData\Local\Temp\nwire733.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD52862ffb5ea32ff114bebe41576441b02
SHA1d9e78d276186e5ca049724796494489e228ff431
SHA2560d7cee0c13374181a23e8f605b32f2969c9c490b83c7891318f26bd17777fd7c
SHA512fc68bf19449801ebe3733d6042684d7a175d446cf893de9e5214abc4db591c8249932590f2528273ea0f3d66a3ec24c1270b067a2fd403926de699893e1b7e9c
-
Filesize
160KB
MD5bd69fa31c7ef693b2087026ff56be528
SHA1e4e7339c6930103511107e8bf9e200850d2227c6
SHA2567a43319c54992f8a04c06fa89c2dd0d67ebd3813c4ab1b47ccadebef819961ec
SHA5127d27e31e727e3aaed99bcf250e94be6f78152d5501a838bd7d92a0b24144f65ad39246d9c7bb0e8305d770f0562cdb51c29edeb9bb5cf46664ba5a655672fc28