Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 22:37
Static task
static1
Behavioral task
behavioral1
Sample
12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe
Resource
win7-20241010-en
General
-
Target
12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe
-
Size
385KB
-
MD5
512281e92d3b3b17ebd7d13adcab06d0
-
SHA1
65a5e333e325afa8ee05b3015fbfb89f5efdcd51
-
SHA256
12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6
-
SHA512
ab03b5061bcaf7b536ce26f35b25608f92b0033802679cf4fe46fca543ff97f2e5117a0eb0d35e5c6ef168be345bf04ef6e284d9878bbb4f6ad14658b128362c
-
SSDEEP
6144:QSUomEUi3+sMZ3xEYIrQ3XF+v/Tt0jwVw2Zurr55CUoxUaxL:BUomEFRu3xEPEU/Xw2mr+qm
Malware Config
Extracted
netwire
adidogoo.duckdns.org:49523
-
activex_autorun
true
-
activex_key
{377W0J1T-0EJ3-2F64-B3NB-C83LV855G7TB}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\dfrg\Logs\
-
lock_executable
false
-
mutex
jRjJvWdO
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Defrg
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3024-22-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral2/memory/3024-26-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral2/memory/3024-28-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral2/memory/4740-39-0x0000000000400000-0x000000000041F000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{377W0J1T-0EJ3-2F64-B3NB-C83LV855G7TB} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{377W0J1T-0EJ3-2F64-B3NB-C83LV855G7TB}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 37 5016 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe -
Executes dropped EXE 4 IoCs
pid Process 2136 Fslpju.exe 3024 Fslpju.exe 1636 Host.exe 4740 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defrg = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2136 set thread context of 3024 2136 Fslpju.exe 93 PID 1636 set thread context of 4740 1636 Host.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fslpju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fslpju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2328 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2136 Fslpju.exe Token: SeDebugPrivilege 1636 Host.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2136 4808 12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe 89 PID 4808 wrote to memory of 2136 4808 12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe 89 PID 4808 wrote to memory of 2136 4808 12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe 89 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 2136 wrote to memory of 3024 2136 Fslpju.exe 93 PID 3024 wrote to memory of 1636 3024 Fslpju.exe 94 PID 3024 wrote to memory of 1636 3024 Fslpju.exe 94 PID 3024 wrote to memory of 1636 3024 Fslpju.exe 94 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96 PID 1636 wrote to memory of 4740 1636 Host.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe"C:\Users\Admin\AppData\Local\Temp\12bc63508f52ba13963e59a56f75d5554fb1aa2b973b16d5db520a011df135e6N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Fslpju.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Fslpju.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Fslpju.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Fslpju.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjFFNzg0QTYtNUMyMS00MTMwLUI3NEMtNzQyRUQ4RTJGREI2fSIgdXNlcmlkPSJ7QkE2OTVDN0YtOEFFOC00Nzc2LTlFRjEtOTZBMDUwMkRFODIzfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NkRCQTE4NzktNUU2Qi00NzVFLTkzNjYtMkVEMzhBRjM3NUI0fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjQ1MzgyMjEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2328
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD518fbd2e5ef9c0e2d91c5e6c05d5148cd
SHA17db55e7ef047a159f4803aa29f4e091d24d0ce2c
SHA2565ea1e5ee74977b5b215d0a8a64f4b83d81a0a81ad880d9a58893c684809e11a3
SHA512a352998bbfd3477e2242a96a10c72895c34770e87f812b37c079931f6741d6999f33c7e08b1875a0b2cf150bdb5819018450a36a0eb547626694fed61265f6a0