Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 02:58

General

  • Target

    0243af48ee2048b33399f9c28ef60573_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    0243af48ee2048b33399f9c28ef60573

  • SHA1

    b821e1d5c27d4d9544ce7104f4beda5544c54b5c

  • SHA256

    8bf55016ba6177159c0747d3638934ba6063a5ebc62cc11807e6b066f50ad4f5

  • SHA512

    f5615e73cf1f82bca2e186853adcc92e7c6cf2c3e5f71046a58986d3279d695b07eef0ffc904db54bb9decc9ea24450cf877062481366628ceb35d1dd408b73e

  • SSDEEP

    12288:+egKZUkFIEgHDQ9toe39h6XvK5JIallT4bM9+x4B60O2SprvvZhkVRJg9Q:+egKZUkFIEgHDKtoeD/JJrT4bEI0O2Y8

Malware Config

Extracted

Family

netwire

C2

kyelines.ddns.net:3465

Attributes
  • activex_autorun

    true

  • activex_key

    {6Y8K87H3-332D-HH14-Y518-5R514072P365}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    WtJimKxE

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0243af48ee2048b33399f9c28ef60573_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0243af48ee2048b33399f9c28ef60573_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:4956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 1156
      2⤵
      • Program crash
      PID:3608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3016 -ip 3016
    1⤵
      PID:1708
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4344

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

        Filesize

        743KB

        MD5

        0243af48ee2048b33399f9c28ef60573

        SHA1

        b821e1d5c27d4d9544ce7104f4beda5544c54b5c

        SHA256

        8bf55016ba6177159c0747d3638934ba6063a5ebc62cc11807e6b066f50ad4f5

        SHA512

        f5615e73cf1f82bca2e186853adcc92e7c6cf2c3e5f71046a58986d3279d695b07eef0ffc904db54bb9decc9ea24450cf877062481366628ceb35d1dd408b73e

      • memory/3016-6-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/3016-11-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/3016-3-0x0000000003360000-0x0000000003361000-memory.dmp

        Filesize

        4KB

      • memory/3016-4-0x0000000002560000-0x0000000002569000-memory.dmp

        Filesize

        36KB

      • memory/3016-5-0x0000000003360000-0x0000000003361000-memory.dmp

        Filesize

        4KB

      • memory/3016-0-0x0000000002560000-0x0000000002569000-memory.dmp

        Filesize

        36KB

      • memory/3016-1-0x0000000003360000-0x0000000003361000-memory.dmp

        Filesize

        4KB

      • memory/3016-2-0x0000000003360000-0x0000000003361000-memory.dmp

        Filesize

        4KB

      • memory/4956-14-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/4956-13-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/4956-15-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/4956-16-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/4956-17-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/4956-18-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB