Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe
Resource
win7-20240903-en
General
-
Target
e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe
-
Size
1.0MB
-
MD5
d02530f3b97431f4ccb75d4fbedcf106
-
SHA1
5825dd6577ca148476f6e68987915206d44d82c4
-
SHA256
e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96
-
SHA512
023377cd5ad6afbfd5631ce29c676fef694daf088a0b44b6d3a165db18c843595cf8bf8c0798d5408c6b374f97b0ad96a97ae9ef738493456bd245f391c4bc8b
-
SSDEEP
24576:46T8Ujl6vO01C1GCTsYoQZtlsZdc40QDrUYuGG1ihTGTTi0CnGkz4mvrgEJLW:eTUwTGTTglz4mvUt
Malware Config
Extracted
netwire
s3awscloud.com:8080
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\sLogs\
-
lock_executable
false
-
offline_keylogger
true
-
password
mrx325hydra11
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1276-24-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1276-39-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Executes dropped EXE 1 IoCs
pid Process 1276 run.exe -
Loads dropped DLL 1 IoCs
pid Process 1276 run.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3612 e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3612 wrote to memory of 1276 3612 e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe 100 PID 3612 wrote to memory of 1276 3612 e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe 100 PID 3612 wrote to memory of 1276 3612 e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe"C:\Users\Admin\AppData\Local\Temp\e6ccbe41f2855cb0789c917f7faaf132d8d2a9ecd103f3c2aaf0f87fca1f8f96.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\aliyunssl\run.exe"C:\Users\Admin\AppData\Local\\aliyunssl\run.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD583b9716b1680484d224f2f20150670bd
SHA1f993e8bfb9a68c7c227b223c37427ab11ebb7155
SHA256091cf05e363b1e0621e50b20797bf816742dc07f422d23ab5443be223d1d2581
SHA5124ab0a94a3decc8ade7921cb85b80ab3b44655fa2de56df17a20bdbfa0bc88c24d80b35397d4c6c191bffd4938cacc36107c1049f862940b88f36280f70ddf192
-
Filesize
160KB
MD5ee78aded588b826f57366b4b2923189a
SHA125d77080b22e6f05a5b77c5cf723dde6e03f7066
SHA256d6a6b99ec598d04f5e70aad4f31cce80f6ebea4e2877fe4a84c4f382a4f135a9
SHA512189e971061cbe73c3f0ab3e8ff8ca4a38c1274f280a3c889d72f986c982d7270ed50a034d30f7577500631cd4f22e89a39c648a19b4655148d746eb57853144f
-
Filesize
81KB
MD53aaf53b44ff6dff13d94890c821bb11d
SHA186555030855bb4aa5a92bcc1887b60943f430457
SHA25609c47ba1ad13aa82404753ef69fb573a1804be31dca825acfc9ad25de2bc4274
SHA5125027ec4960d4b5d7f599a1001b1471dfb24f1a644c244ee91db6a54f5c1a63c5faf64b7a217c9757da9a9adea204a27707aed15ad60bb39819ff54ebd8053282