Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 00:13
Behavioral task
behavioral1
Sample
BBVA_CONTINENTAL.exe
Resource
win7-20241010-en
General
-
Target
BBVA_CONTINENTAL.exe
-
Size
475KB
-
MD5
c621bbe4050616a3e086eff0003c0739
-
SHA1
5527d8ab10c04aea8d149d9056199895b7d79d0e
-
SHA256
de7a446a8d4bd4c53ba8ac5b909252692e79b27cd9e7abb6396e62e22274b3b4
-
SHA512
1fc11eaab31db24b848d11097ff9abd1cd3603f34db875dc45328f21ac1a12f6e32da271600035639e8b41e4c6ba6d21bb0fbeeec3d5d3cc70c4a3c6c33bec00
-
SSDEEP
12288:talGzgvpec7Cmv1BdWw/2xv3GdfzF4yFv:6TAc+PwexedfjFv
Malware Config
Extracted
netwire
43.226.229.43:2030
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Omega
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1624-4-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2200-10-0x00000000038B0000-0x00000000038E3000-memory.dmp netwire behavioral1/memory/1624-6-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/3004-34-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2928-38-0x0000000003770000-0x0000000003881000-memory.dmp netwire behavioral1/memory/2928-42-0x0000000003770000-0x00000000037A3000-memory.dmp netwire behavioral1/memory/2736-55-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/3004-53-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Executes dropped EXE 3 IoCs
pid Process 2940 Host.exe 3004 Host.exe 2880 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 BBVA_CONTINENTAL.exe 1624 BBVA_CONTINENTAL.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BBVA_CONTINENTAL.exe" BBVA_CONTINENTAL.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2200 set thread context of 1624 2200 BBVA_CONTINENTAL.exe 30 PID 2940 set thread context of 3004 2940 Host.exe 34 PID 2928 set thread context of 2736 2928 BBVA_CONTINENTAL.exe 36 -
resource yara_rule behavioral1/memory/2200-0-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2200-9-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2200-5-0x00000000038B0000-0x00000000039C1000-memory.dmp upx behavioral1/memory/2636-28-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2940-22-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/files/0x00070000000195ad-21.dat upx behavioral1/memory/2928-25-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2928-43-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2940-46-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2772-45-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2880-51-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral1/memory/2772-52-0x0000000000400000-0x0000000000511000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 BBVA_CONTINENTAL.exe 2636 BBVA_CONTINENTAL.exe 2636 BBVA_CONTINENTAL.exe 2940 Host.exe 2928 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2772 BBVA_CONTINENTAL.exe 2880 Host.exe 2880 Host.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2200 BBVA_CONTINENTAL.exe 2940 Host.exe 2928 BBVA_CONTINENTAL.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1624 2200 BBVA_CONTINENTAL.exe 30 PID 2200 wrote to memory of 1624 2200 BBVA_CONTINENTAL.exe 30 PID 2200 wrote to memory of 1624 2200 BBVA_CONTINENTAL.exe 30 PID 2200 wrote to memory of 1624 2200 BBVA_CONTINENTAL.exe 30 PID 2200 wrote to memory of 2636 2200 BBVA_CONTINENTAL.exe 31 PID 2200 wrote to memory of 2636 2200 BBVA_CONTINENTAL.exe 31 PID 2200 wrote to memory of 2636 2200 BBVA_CONTINENTAL.exe 31 PID 2200 wrote to memory of 2636 2200 BBVA_CONTINENTAL.exe 31 PID 1624 wrote to memory of 2940 1624 BBVA_CONTINENTAL.exe 32 PID 1624 wrote to memory of 2940 1624 BBVA_CONTINENTAL.exe 32 PID 1624 wrote to memory of 2940 1624 BBVA_CONTINENTAL.exe 32 PID 1624 wrote to memory of 2940 1624 BBVA_CONTINENTAL.exe 32 PID 2636 wrote to memory of 2928 2636 BBVA_CONTINENTAL.exe 33 PID 2636 wrote to memory of 2928 2636 BBVA_CONTINENTAL.exe 33 PID 2636 wrote to memory of 2928 2636 BBVA_CONTINENTAL.exe 33 PID 2636 wrote to memory of 2928 2636 BBVA_CONTINENTAL.exe 33 PID 2940 wrote to memory of 3004 2940 Host.exe 34 PID 2940 wrote to memory of 3004 2940 Host.exe 34 PID 2940 wrote to memory of 3004 2940 Host.exe 34 PID 2940 wrote to memory of 3004 2940 Host.exe 34 PID 2940 wrote to memory of 2880 2940 Host.exe 35 PID 2940 wrote to memory of 2880 2940 Host.exe 35 PID 2940 wrote to memory of 2880 2940 Host.exe 35 PID 2940 wrote to memory of 2880 2940 Host.exe 35 PID 2928 wrote to memory of 2736 2928 BBVA_CONTINENTAL.exe 36 PID 2928 wrote to memory of 2736 2928 BBVA_CONTINENTAL.exe 36 PID 2928 wrote to memory of 2736 2928 BBVA_CONTINENTAL.exe 36 PID 2928 wrote to memory of 2736 2928 BBVA_CONTINENTAL.exe 36 PID 2928 wrote to memory of 2772 2928 BBVA_CONTINENTAL.exe 37 PID 2928 wrote to memory of 2772 2928 BBVA_CONTINENTAL.exe 37 PID 2928 wrote to memory of 2772 2928 BBVA_CONTINENTAL.exe 37 PID 2928 wrote to memory of 2772 2928 BBVA_CONTINENTAL.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 3004 2595189424⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe" 2 1624 2595172412⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe" 2 2736 2595190044⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5c621bbe4050616a3e086eff0003c0739
SHA15527d8ab10c04aea8d149d9056199895b7d79d0e
SHA256de7a446a8d4bd4c53ba8ac5b909252692e79b27cd9e7abb6396e62e22274b3b4
SHA5121fc11eaab31db24b848d11097ff9abd1cd3603f34db875dc45328f21ac1a12f6e32da271600035639e8b41e4c6ba6d21bb0fbeeec3d5d3cc70c4a3c6c33bec00