Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe
Resource
win7-20240903-en
General
-
Target
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe
-
Size
261KB
-
MD5
b11998e748a73de0094e9c8a742225e6
-
SHA1
d7ec09cd52c1f0e2f6d21dfda48689d51b7a4840
-
SHA256
a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad
-
SHA512
210e60c67a5dca1376698e41df5ea7c483b5ca353e767d21405074bade4d44bcbf576ccb9437baba4ce9bc85bec8d963975a69c0286318232e2bc8793b935794
-
SSDEEP
6144:ZNJfAJdpbgneJK2BPqWOyJAGovjNcjat9w44mZ/M:STFgeE2BbOIrovjm+934U
Malware Config
Extracted
netwire
wealthymachine.ddns.net:39560
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
sunshineslisa
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/556-22-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/556-24-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/556-26-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Netwire family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 Audio.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Audio.exe" a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 556 3012 Audio.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5000 556 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Audio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2564 a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe Token: SeDebugPrivilege 3012 Audio.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3012 2564 a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe 84 PID 2564 wrote to memory of 3012 2564 a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe 84 PID 2564 wrote to memory of 3012 2564 a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe 84 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85 PID 3012 wrote to memory of 556 3012 Audio.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe"C:\Users\Admin\AppData\Local\Temp\a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Audio.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Audio.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 5804⤵
- Program crash
PID:5000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 556 -ip 5561⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5b11998e748a73de0094e9c8a742225e6
SHA1d7ec09cd52c1f0e2f6d21dfda48689d51b7a4840
SHA256a86d9bb9ad2b22d6148329d45a59cbc27c7f3a8e65e8997fffda803b16f25fad
SHA512210e60c67a5dca1376698e41df5ea7c483b5ca353e767d21405074bade4d44bcbf576ccb9437baba4ce9bc85bec8d963975a69c0286318232e2bc8793b935794