Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 05:02

General

  • Target

    0914657239a3497433c1777e60d761e1_JaffaCakes118.exe

  • Size

    390KB

  • MD5

    0914657239a3497433c1777e60d761e1

  • SHA1

    c7d6bca47753362f40e18d44935c75ecd990df2a

  • SHA256

    3b1ae6021b84138920670f125a1f76cf2625fc1ea104e7228a59cce91d899b83

  • SHA512

    e4bf46e5939f399143b41aa4d880bcddb5f0559703691ba968a87d4893d450b689dc8ba002279d238dfbbccbb6844cb982aa21ac60e37e454c0eb48740334efd

  • SSDEEP

    12288:cdq4BnAn7gOsqs3sVYXjRpv2ZPbNpINABZ9JKrT0NJmB:q6vszcKFoVD0ezJQ

Malware Config

Extracted

Family

netwire

C2

pustios.ug:6971

testingskapss.ru:6971

papapamels.ru:6971

testingskapss.su:6971

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • lock_executable

    false

  • mutex

    JTbRfkgY

  • offline_keylogger

    false

  • password

    ppF7"oRyqm

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 5 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 11 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0914657239a3497433c1777e60d761e1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0914657239a3497433c1777e60d761e1_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\0914657239a3497433c1777e60d761e1_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2876
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\0914657239a3497433c1777e60d761e1_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\0914657239a3497433c1777e60d761e1_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\svsr.exe"
      2⤵
      • NTFS ADS
      PID:1248
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\svsr.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Users\Admin\AppData\Local\svsr.exe
        "C:\Users\Admin\AppData\Local\svsr.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\svsr.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1176
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\svsr.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1500
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
            PID:352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950AB

      Filesize

      834B

      MD5

      cbed24fd2b55aea95367efca5ee889de

      SHA1

      946f48b5c344fd57113845cd483fed5fb9fa3e54

      SHA256

      1dc8a0fcbe260b77adfe5ad9aaac543239b2a0d9f4e1f3c2657beee4376ffee4

      SHA512

      c504a11ea576f8ce14de26a0617e22e71e14db0f1dadefc187ce94e4a35a83743c743824e3629899c262aae4772bb86a0ee5bb643db20645483f0c376215ec6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_6BD1009EF4F09B1C85313EF547367694

      Filesize

      1KB

      MD5

      9904f2d1918787a8026365c8d0c1cd8d

      SHA1

      a53e7d834e535009e983cd78ee13e71f28a7c0b5

      SHA256

      dd8370aa7deb653694cc8866609a76a61ed11f1935b334d81f9d7a0d6e51046b

      SHA512

      81cee6eefb91edb95ee1526fa3e71f385b70f09f2f8901f1f649a2013469aa56fc0a7a526270fbd06e9f24c3aa8346d41c9545e45e0a522ca153167056aa037d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950AB

      Filesize

      180B

      MD5

      94f64c34329be358e5a2bfb98619f676

      SHA1

      c77d75e1405dc85357a2e28e1dad46718ce38a9a

      SHA256

      208b361ceec31e5cb0da658b52aa9cbecb1c4ccc8d178739439ad40bc869db91

      SHA512

      bad27479fbc267d1c2ea19481fc2f8d1071c9f345324ed0a4e85553ec22f4f080d437ac920649d914d7dffe2533c40149091ba78f2ca38b797cb4b1d22b2c314

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c10a03e85dcd0f0dbe897641bc8324d0

      SHA1

      ab210a6079eedc252ded71ae82e5d7b3f55fa4a0

      SHA256

      9d3a3ab6fc9afd311510cf2716155d3217b2a1ef5a840a397b8b0df5d2813747

      SHA512

      9f8cebd9d577f20dffd764b2c806d20e43c262e7577fd93a370e62ff1c456c8aec35887a43e1a907213845b27d339e70029cf780af4da8cf2a7d41868f7ae43c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

      Filesize

      398B

      MD5

      e3bba6f6340d2f46eab9b61facbc4078

      SHA1

      7ae978762b728cccecfbe926290bf22142edf56d

      SHA256

      238a3570c79c3eda6e3d47f487daf03e4935e1d3e5e7105a38e5725185272051

      SHA512

      ac9467a552fec3702aba5877fc3a990b013165b1811c8c322f9b82d65d89b384a4155dac0ba25cb5ca449422bfccea59e6906487a2dd1af64cc97ef8b4405b28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EA618097E393409AFA316F0F87E2C202_6BD1009EF4F09B1C85313EF547367694

      Filesize

      402B

      MD5

      11f2cd82595b412e24450292b1113237

      SHA1

      88f910fb7de6a923d91253da7ef656b6c73640b1

      SHA256

      715050a8d377e4ad30f2ef0f8bbb457dd3709cc9942cc17e200fcf1730b363ab

      SHA512

      151eb3a525f7c1aaadea4749c8fb4fb0656f47626f93b4358ac96c24e10b7845bdcf0305a743c9fee3b98e44cdcfd22d5b16f88973e9e7dd25bb9fad2aa178d5

    • C:\Users\Admin\AppData\Local\Temp\Tar11F2.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\svsr.exe

      Filesize

      390KB

      MD5

      0914657239a3497433c1777e60d761e1

      SHA1

      c7d6bca47753362f40e18d44935c75ecd990df2a

      SHA256

      3b1ae6021b84138920670f125a1f76cf2625fc1ea104e7228a59cce91d899b83

      SHA512

      e4bf46e5939f399143b41aa4d880bcddb5f0559703691ba968a87d4893d450b689dc8ba002279d238dfbbccbb6844cb982aa21ac60e37e454c0eb48740334efd

    • memory/352-119-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-121-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-133-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-132-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-131-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/352-129-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-128-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-126-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/352-123-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/1808-97-0x0000000001270000-0x00000000012D6000-memory.dmp

      Filesize

      408KB

    • memory/1808-118-0x0000000001230000-0x000000000123C000-memory.dmp

      Filesize

      48KB

    • memory/2952-88-0x0000000000C00000-0x0000000000C0C000-memory.dmp

      Filesize

      48KB

    • memory/2952-0-0x00000000010E0000-0x0000000001146000-memory.dmp

      Filesize

      408KB

    • memory/2952-1-0x0000000074AA0000-0x000000007518E000-memory.dmp

      Filesize

      6.9MB

    • memory/2952-85-0x00000000063E0000-0x0000000006420000-memory.dmp

      Filesize

      256KB

    • memory/2952-86-0x00000000005C0000-0x00000000005EA000-memory.dmp

      Filesize

      168KB

    • memory/2952-87-0x0000000000AF0000-0x0000000000AF8000-memory.dmp

      Filesize

      32KB

    • memory/2952-89-0x0000000074AA0000-0x000000007518E000-memory.dmp

      Filesize

      6.9MB

    • memory/2952-93-0x00000000063E0000-0x0000000006420000-memory.dmp

      Filesize

      256KB

    • memory/2952-98-0x0000000074AA0000-0x000000007518E000-memory.dmp

      Filesize

      6.9MB