Analysis

  • max time kernel
    143s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 19:11

General

  • Target

    fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe

  • Size

    852KB

  • MD5

    fd71393eda58df36ee3618f526ffb3e0

  • SHA1

    0d1a0cd0660099f34f8620dd7b338b0b6ab3671d

  • SHA256

    e07abb182a17f0aa383972c376849fd46a74f105a2f2c5f949441028a66c5538

  • SHA512

    b22aed4b27466d9bde1236bf7643e8f81c148e9f4e7bce92b93abb9513b61935bd4fdb6648ffa5338f395f38a90fbbd11fb410dd80f82755093c5a15dceaadd3

  • SSDEEP

    24576:iRmJkcoQricOIQxiZY1iaSAD00jSORI6Ttm8:3JZoQrbTFZY1iaSADmO

Malware Config

Extracted

Family

netwire

C2

benti.ddns.net:3350

Attributes
  • activex_autorun

    true

  • activex_key

    {2FMC35P2-J0LB-143R-SR61-UGN00XFQ045P}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    Adobe

  • use_mutex

    false

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops startup file 1 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe" /AutoIt3ExecuteScript C:\Users\Admin\AppData\Local\Temp\lol.bin
      2⤵
      • Drops startup file
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 116
          4⤵
          • Program crash
          PID:2720
      • C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2672

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lol.bin
    Filesize

    134KB

    MD5

    f0dd33ff1510513d62905d914a4c0374

    SHA1

    117a4b5d34409a199d31bcfffc06494fe1b879ad

    SHA256

    60953008cd8aa7f9163a6703268fd6cdbfea13f759fbdabab5dc26e3444ede55

    SHA512

    0f32c9384a1541259f92f3143da579352c74b98bf9046bec6ff410e0bdc5ff38bca33cc8a64cca5f4d2115767079da2e178432a5c4c3b1dad1611613e33c6783

  • C:\Users\Admin\AppData\Local\Temp\pid.txt
    Filesize

    4B

    MD5

    f0f6ba4b5e0000340312d33c212c3ae8

    SHA1

    f40c22f2dc6461f1cd9243ad4df239052f78040f

    SHA256

    18177338c3669a1314d644b7f4ecfd18a5c735e819edf1e2062c3bc354d0dd7f

    SHA512

    b9537ba03e00791da5b07082b0a6ce3b087af1620f122c59f02edfc589d55794141496311841da65992cf9fc369d05d40a573d37b90da7f0228cc150c1c39988

  • memory/2544-4-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-8-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-10-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-6-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-14-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-16-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2544-18-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2672-17-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-20-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-23-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-22-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-24-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-26-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-25-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-13-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2672-30-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB