Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 19:08

General

  • Target

    0a6886bdf35cdcc9a22d5d3170d701e0_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    0a6886bdf35cdcc9a22d5d3170d701e0

  • SHA1

    e953b5e127597851b3f283ef3b039e2fa44127a5

  • SHA256

    0a852cb2b5df5b5a1ad60663ae63a6439a97760436f4e53d6aa8c61ed7b6510b

  • SHA512

    1bc59d47a33c3d881a07cb6898456840037dbf1ff4cac0aaeaee94efc1f9e0e3f85f2e4c01c2c7d8ea9d29ec9324aef09b610344ff76416befcb61dadbcdea01

  • SSDEEP

    12288:T4ZgE3t2WLtJHtP9dqWU0Sm0izsTJSPpV6v3m1aGQyXFvF3jaw7RXzmShKW9RpBs:axz4cIa2eRTQM6nFrsh

Malware Config

Extracted

Family

netwire

C2

13.67.110.214:8080

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\SysLogs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    mrx325

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a6886bdf35cdcc9a22d5d3170d701e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a6886bdf35cdcc9a22d5d3170d701e0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:5604
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 596
          3⤵
          • Program crash
          PID:432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5604 -ip 5604
      1⤵
        PID:3600

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5116-0-0x00000000006C0000-0x00000000007E8000-memory.dmp

        Filesize

        1.2MB

      • memory/5116-1-0x0000000074DA0000-0x0000000075550000-memory.dmp

        Filesize

        7.7MB

      • memory/5116-2-0x0000000074DA0000-0x0000000075550000-memory.dmp

        Filesize

        7.7MB

      • memory/5116-3-0x0000000005390000-0x00000000053A0000-memory.dmp

        Filesize

        64KB

      • memory/5116-10-0x0000000074DA0000-0x0000000075550000-memory.dmp

        Filesize

        7.7MB

      • memory/5604-9-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5604-7-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5604-4-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB