Analysis

  • max time kernel
    106s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2025, 16:40

General

  • Target

    f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e.exe

  • Size

    1.0MB

  • MD5

    0e4f29b6131f087e7fab5592df2c8a5a

  • SHA1

    53401638d823a38cc4c97e841e6ea87fb9e27f08

  • SHA256

    f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e

  • SHA512

    c359a480c1fe03e8e16cc9005b7cb513a4e9ffec90a9b1ad34bbfc568174432a1028bcafca698590aa44003cd3d92d3421dfa79a6af413cb618817e8716a1491

  • SSDEEP

    12288:WIsFHjuJv7DJ5cYkKwR17iUpCFLchjNOFkOhMH6FpfMH81rqL:gjuvhprUKL+p4fa81i

Malware Config

Extracted

Family

netwire

C2

pre08080.nsupdate.info:4770

dora21.duckdns.org:4770

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e.exe
    "C:\Users\Admin\AppData\Local\Temp\f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\Temp\f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e.exe
      "C:\Users\Admin\AppData\Local\Temp\f4af46ad96a86cad60d613a3387a0a68c580247ef88943e2ea0e5b9679a38c2e.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-8-0x0000000006D20000-0x0000000006D6C000-memory.dmp

    Filesize

    304KB

  • memory/956-9-0x0000000008170000-0x00000000081E6000-memory.dmp

    Filesize

    472KB

  • memory/956-2-0x0000000005EF0000-0x0000000006494000-memory.dmp

    Filesize

    5.6MB

  • memory/956-3-0x0000000005890000-0x0000000005922000-memory.dmp

    Filesize

    584KB

  • memory/956-4-0x00000000749F0000-0x00000000751A0000-memory.dmp

    Filesize

    7.7MB

  • memory/956-5-0x0000000005A50000-0x0000000005A5A000-memory.dmp

    Filesize

    40KB

  • memory/956-1-0x0000000000DB0000-0x0000000000EBC000-memory.dmp

    Filesize

    1.0MB

  • memory/956-6-0x00000000749FE000-0x00000000749FF000-memory.dmp

    Filesize

    4KB

  • memory/956-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

    Filesize

    4KB

  • memory/956-7-0x00000000749F0000-0x00000000751A0000-memory.dmp

    Filesize

    7.7MB

  • memory/956-10-0x0000000006DA0000-0x0000000006DBE000-memory.dmp

    Filesize

    120KB

  • memory/956-12-0x0000000006E10000-0x0000000006E2C000-memory.dmp

    Filesize

    112KB

  • memory/956-17-0x00000000749F0000-0x00000000751A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2380-16-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2380-13-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2380-18-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB