Analysis
-
max time kernel
104s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 07:27
Behavioral task
behavioral1
Sample
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
Resource
win7-20241023-en
General
-
Target
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
-
Size
160KB
-
MD5
48e6ba377d90401cee819471fcea38b9
-
SHA1
0f6f6ef2b5691946703d37a6316452dda6d5eab5
-
SHA256
b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
-
SHA512
caf22b64bf47f6515d7f75dbfc8605ce85a3248188d61049f1cd54ce0b6cbb441fd1005333464f66a95d990e2f912d4b60e5418a4d7b14fd4f115e156cbf307f
-
SSDEEP
3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvGdYMjMqqDL0Ff:jOTcK+NrRioGHlz8rz0i/8zQqqDwFf
Malware Config
Extracted
netwire
netwire2021.duckdns.org:7929
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-yISsE2
-
keylogger_dir
C:\Users\Administrator\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
qFlJFfII
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3176-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3176-1-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Program crash 1 IoCs
pid pid_target Process procid_target 5012 3176 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe"C:\Users\Admin\AppData\Local\Temp\b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 3602⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3176 -ip 31761⤵PID:3956