Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 08:02

General

  • Target

    04bbdd921511f861a0f57266f1b4df74_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    04bbdd921511f861a0f57266f1b4df74

  • SHA1

    9bc604264b0bbb72e4676a03410b362d13dfc4fe

  • SHA256

    0e96012b8943538086ce528e979199c5d70c30ed8baac4336f43ae02a410a769

  • SHA512

    29a1566adbee4a9271279af58f97746e1cb47f5cd3d046cf4cf7737dc59f9595f80aecca06ff7b9cdb18cd4377958cddb3ee984b1746ba2a954d1bfe1b316da1

  • SSDEEP

    24576:n6dCrRs7z+jfzalONIoo7LGOb7Bwew9s6yApEwviC9P:6YqO1o7/63pEq

Malware Config

Extracted

Family

netwire

C2

pd1n.ddns.net:1968

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    pd1n-noip

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Kimbolsapoq!P12

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04bbdd921511f861a0f57266f1b4df74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04bbdd921511f861a0f57266f1b4df74_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Roaming\jhgnmklphnm\sfdwxncdr.exe
        "C:\Users\Admin\AppData\Roaming\jhgnmklphnm\sfdwxncdr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "fgtyhrtg" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\fgtyhrtg.txt" | cmd"
            5⤵
            • Adds Run key to start application
            PID:4172
        • C:\Windows\Microsoft.net\Framework\v2.0.50727\regasm.exe
          "C:\Users\Admin\AppData\Roaming\jhgnmklphnm\sfdwxncdr.exe"
          4⤵
          • Drops file in Windows directory
          PID:3264
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4584 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

      Filesize

      1KB

      MD5

      87c9b5aa0aba47f43667849b7ad94679

      SHA1

      ab92c9d13c7837b041b1015e240e928abbed1210

      SHA256

      62e7f4c427bb51f537caaaed3a6c07428b6960adf7d2f1af34868467528c6902

      SHA512

      8906cc2d8a6fd38f531df12594413c5a8755ac0c3af82a7d86a7b17d2678f678df4b62cd4c2eca77199317349eb01bcd1d0cada684a18c3cec5fe7ca8170e4ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A3D5BF1283C2E63D8C8A8C72F0051F5A

      Filesize

      834B

      MD5

      cbed24fd2b55aea95367efca5ee889de

      SHA1

      946f48b5c344fd57113845cd483fed5fb9fa3e54

      SHA256

      1dc8a0fcbe260b77adfe5ad9aaac543239b2a0d9f4e1f3c2657beee4376ffee4

      SHA512

      c504a11ea576f8ce14de26a0617e22e71e14db0f1dadefc187ce94e4a35a83743c743824e3629899c262aae4772bb86a0ee5bb643db20645483f0c376215ec6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_6DEFC1B0F00B73D870DAEE9AD78095DA

      Filesize

      398B

      MD5

      597b19f36acded84351751f1736499a2

      SHA1

      9630c1d2f4d7d4da6bb215292774783094e2b709

      SHA256

      14b0d0d90cf6283e0d96b6f5fc582035d3ba444d30440b4d8a2fc59f64126767

      SHA512

      8f25092abcb5ba8197e5549a8aca2ff61762178e4bc33a6247e4dedd05d24fb9c8d509cdcf788da2bfd34faa60973066e1424e1443cbed2f7f43f75b2e8e2853

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

      Filesize

      392B

      MD5

      f0871da629c4ddd9510609e1404305c1

      SHA1

      61e00059cbbcc5892c53193b78f58eb1e3460e48

      SHA256

      cfc31ecc643b8188057e0fe095090e314c7312fcb9dcc54e7b7e1411430449b4

      SHA512

      e079eea164f7496cc02fce81e7329cde3d1f5d4bdaa579c6784dd58865721247c557034fcb5d67a4fd7a540bab504d67859c8c9e8f3ff5fd8da0d96ce591b6c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A3D5BF1283C2E63D8C8A8C72F0051F5A

      Filesize

      178B

      MD5

      2b7fecfa5a0ef9f6dd353da61d9196ac

      SHA1

      89f15a851e5556b5f8cc947e7828d34a9ac5c7d5

      SHA256

      dabbd25a1a50c3f652f55aeb2255bdb8156f346e5557bd98c611913af87a394d

      SHA512

      07c2d66270a827c82751953ec6f1f88a37f6673005a2ae1638acd389d49c99a85293da6378628a47fac617d43bc58670f36cc6626051a1b46cd9c2071c7ed762

    • C:\Users\Admin\AppData\Roaming\jhgnmklphnm\sfdwxncdr.exe

      Filesize

      1.2MB

      MD5

      04bbdd921511f861a0f57266f1b4df74

      SHA1

      9bc604264b0bbb72e4676a03410b362d13dfc4fe

      SHA256

      0e96012b8943538086ce528e979199c5d70c30ed8baac4336f43ae02a410a769

      SHA512

      29a1566adbee4a9271279af58f97746e1cb47f5cd3d046cf4cf7737dc59f9595f80aecca06ff7b9cdb18cd4377958cddb3ee984b1746ba2a954d1bfe1b316da1

    • memory/3264-32-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3264-40-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3264-36-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4796-0-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB

    • memory/4796-2-0x0000000000E90000-0x0000000000EA0000-memory.dmp

      Filesize

      64KB

    • memory/4796-1-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB

    • memory/4796-30-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB

    • memory/5020-27-0x0000000001890000-0x00000000018A0000-memory.dmp

      Filesize

      64KB

    • memory/5020-34-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB

    • memory/5020-29-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB

    • memory/5020-20-0x0000000074DE0000-0x0000000075391000-memory.dmp

      Filesize

      5.7MB