Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 00:13
Behavioral task
behavioral1
Sample
BBVA_CONTINENTAL.exe
Resource
win7-20241010-en
General
-
Target
BBVA_CONTINENTAL.exe
-
Size
475KB
-
MD5
c621bbe4050616a3e086eff0003c0739
-
SHA1
5527d8ab10c04aea8d149d9056199895b7d79d0e
-
SHA256
de7a446a8d4bd4c53ba8ac5b909252692e79b27cd9e7abb6396e62e22274b3b4
-
SHA512
1fc11eaab31db24b848d11097ff9abd1cd3603f34db875dc45328f21ac1a12f6e32da271600035639e8b41e4c6ba6d21bb0fbeeec3d5d3cc70c4a3c6c33bec00
-
SSDEEP
12288:talGzgvpec7Cmv1BdWw/2xv3GdfzF4yFv:6TAc+PwexedfjFv
Malware Config
Extracted
netwire
43.226.229.43:2030
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Omega
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral2/memory/5748-5-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5748-7-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5748-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/2272-32-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4692-51-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/2272-49-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation BBVA_CONTINENTAL.exe -
Executes dropped EXE 3 IoCs
pid Process 5084 Host.exe 2272 Host.exe 4664 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BBVA_CONTINENTAL.exe" BBVA_CONTINENTAL.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2400 set thread context of 5748 2400 BBVA_CONTINENTAL.exe 88 PID 5084 set thread context of 2272 5084 Host.exe 92 PID 5476 set thread context of 4692 5476 BBVA_CONTINENTAL.exe 94 -
resource yara_rule behavioral2/memory/2400-0-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/5296-10-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/2400-12-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/files/0x0007000000024311-16.dat upx behavioral2/memory/5476-26-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/5296-33-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/4664-35-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/5084-37-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/5476-45-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/4664-48-0x0000000000400000-0x0000000000511000-memory.dmp upx behavioral2/memory/4716-53-0x0000000000400000-0x0000000000511000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BBVA_CONTINENTAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Host.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Host.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Host.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Host.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ BBVA_CONTINENTAL.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ BBVA_CONTINENTAL.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 BBVA_CONTINENTAL.exe 2400 BBVA_CONTINENTAL.exe 5296 BBVA_CONTINENTAL.exe 5296 BBVA_CONTINENTAL.exe 5296 BBVA_CONTINENTAL.exe 5296 BBVA_CONTINENTAL.exe 5084 Host.exe 5084 Host.exe 4664 Host.exe 4664 Host.exe 4664 Host.exe 4664 Host.exe 5476 BBVA_CONTINENTAL.exe 5476 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe 4716 BBVA_CONTINENTAL.exe 4716 BBVA_CONTINENTAL.exe 4664 Host.exe 4664 Host.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2400 BBVA_CONTINENTAL.exe 5084 Host.exe 5476 BBVA_CONTINENTAL.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2400 wrote to memory of 5748 2400 BBVA_CONTINENTAL.exe 88 PID 2400 wrote to memory of 5748 2400 BBVA_CONTINENTAL.exe 88 PID 2400 wrote to memory of 5748 2400 BBVA_CONTINENTAL.exe 88 PID 2400 wrote to memory of 5296 2400 BBVA_CONTINENTAL.exe 89 PID 2400 wrote to memory of 5296 2400 BBVA_CONTINENTAL.exe 89 PID 2400 wrote to memory of 5296 2400 BBVA_CONTINENTAL.exe 89 PID 5748 wrote to memory of 5084 5748 BBVA_CONTINENTAL.exe 90 PID 5748 wrote to memory of 5084 5748 BBVA_CONTINENTAL.exe 90 PID 5748 wrote to memory of 5084 5748 BBVA_CONTINENTAL.exe 90 PID 5296 wrote to memory of 5476 5296 BBVA_CONTINENTAL.exe 91 PID 5296 wrote to memory of 5476 5296 BBVA_CONTINENTAL.exe 91 PID 5296 wrote to memory of 5476 5296 BBVA_CONTINENTAL.exe 91 PID 5084 wrote to memory of 2272 5084 Host.exe 92 PID 5084 wrote to memory of 2272 5084 Host.exe 92 PID 5084 wrote to memory of 2272 5084 Host.exe 92 PID 5084 wrote to memory of 4664 5084 Host.exe 93 PID 5084 wrote to memory of 4664 5084 Host.exe 93 PID 5084 wrote to memory of 4664 5084 Host.exe 93 PID 5476 wrote to memory of 4692 5476 BBVA_CONTINENTAL.exe 94 PID 5476 wrote to memory of 4692 5476 BBVA_CONTINENTAL.exe 94 PID 5476 wrote to memory of 4692 5476 BBVA_CONTINENTAL.exe 94 PID 5476 wrote to memory of 4716 5476 BBVA_CONTINENTAL.exe 95 PID 5476 wrote to memory of 4716 5476 BBVA_CONTINENTAL.exe 95 PID 5476 wrote to memory of 4716 5476 BBVA_CONTINENTAL.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 2272 2406179684⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe" 2 5748 2406174532⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe"C:\Users\Admin\AppData\Local\Temp\BBVA_CONTINENTAL.exe" 2 4692 2406183904⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5c621bbe4050616a3e086eff0003c0739
SHA15527d8ab10c04aea8d149d9056199895b7d79d0e
SHA256de7a446a8d4bd4c53ba8ac5b909252692e79b27cd9e7abb6396e62e22274b3b4
SHA5121fc11eaab31db24b848d11097ff9abd1cd3603f34db875dc45328f21ac1a12f6e32da271600035639e8b41e4c6ba6d21bb0fbeeec3d5d3cc70c4a3c6c33bec00