Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 03:31
Static task
static1
Behavioral task
behavioral1
Sample
5360EF1E31488F58A10481E97BC99189.exe
Resource
win7-20240903-en
General
-
Target
5360EF1E31488F58A10481E97BC99189.exe
-
Size
2.2MB
-
MD5
5360ef1e31488f58a10481e97bc99189
-
SHA1
03a5a885f8cb0c06189768515763b764c2cc14ee
-
SHA256
55230c307898ecf9cde4abe61d12f60188fe68572440e28948dbf8e9b40ee905
-
SHA512
919f8d756466ec9ca46e855449f7183be1bdfc842e875147c8d9fa31c9a8e0ed72f9b1f1ff5faf1a618eba581dfdc2e1341501f73167bf475281bd52c93ef53a
-
SSDEEP
49152:5/dYw5NiJQgm+pUepZG2rIPHRTA449qILWhgn:dqEQJQgJmep/OxTPwqILWhc
Malware Config
Extracted
netwire
javaupdate.100chickens.biz:6988
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
XubCoRQh
-
offline_keylogger
true
-
password
123
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4720-35-0x0000000000530000-0x000000000055C000-memory.dmp netwire behavioral2/memory/4720-41-0x0000000000530000-0x000000000055C000-memory.dmp netwire -
Netwire family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5360EF1E31488F58A10481E97BC99189.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 Host.exe 3596 NinjaGram.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afndpbcmebdw = "C:\\Users\\Admin\\AppData\\Roaming\\ccacsbyxclro\\system32.exe" Host.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023c9c-6.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 4720 2336 Host.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5360EF1E31488F58A10481E97BC99189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NinjaGram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\cimv2 Host.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 Host.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 740 dw20.exe Token: SeBackupPrivilege 740 dw20.exe Token: SeBackupPrivilege 740 dw20.exe Token: SeBackupPrivilege 740 dw20.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2336 2252 5360EF1E31488F58A10481E97BC99189.exe 82 PID 2252 wrote to memory of 2336 2252 5360EF1E31488F58A10481E97BC99189.exe 82 PID 2252 wrote to memory of 2336 2252 5360EF1E31488F58A10481E97BC99189.exe 82 PID 2252 wrote to memory of 3596 2252 5360EF1E31488F58A10481E97BC99189.exe 84 PID 2252 wrote to memory of 3596 2252 5360EF1E31488F58A10481E97BC99189.exe 84 PID 2252 wrote to memory of 3596 2252 5360EF1E31488F58A10481E97BC99189.exe 84 PID 3596 wrote to memory of 740 3596 NinjaGram.exe 85 PID 3596 wrote to memory of 740 3596 NinjaGram.exe 85 PID 3596 wrote to memory of 740 3596 NinjaGram.exe 85 PID 2336 wrote to memory of 4720 2336 Host.exe 105 PID 2336 wrote to memory of 4720 2336 Host.exe 105 PID 2336 wrote to memory of 4720 2336 Host.exe 105 PID 2336 wrote to memory of 4720 2336 Host.exe 105 PID 2336 wrote to memory of 4720 2336 Host.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5360EF1E31488F58A10481E97BC99189.exe"C:\Users\Admin\AppData\Local\Temp\5360EF1E31488F58A10481E97BC99189.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\NinjaGram.exe"C:\Users\Admin\AppData\Local\Temp\NinjaGram.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8243⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58343a43f335207712b877148a6f4aea1
SHA10498734e7a1008b7795fc1d6b361de088636266a
SHA25699b2566477a997742a92dd25c1af40ad4ce541a16c85b7713c6dfd7872a03a94
SHA512336682a955eabd82c2bc8299f60b914903a271df11dce63a629d9efbcb8ab5fa711646ebb632f2da218c3ac3e3c39de42c26ac50ef37d950e2d4e39a27b5ae41
-
Filesize
4.0MB
MD590eb95ca9659bb476fb23ba4e8801e9d
SHA1862587634783bb6a46cf901798329a73272d833f
SHA256f56455abc3a972e0e19db6bdaf434637dca670842803b5bd1943bd9e3b4ca5bc
SHA512ccad649248ea1849488acf36925ace501482c61433fb41708e841f35692bc95a9b13db7183f2733fe208faa06791c0e966440e829c39c8d0d62ea1eba8cf48ba