Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2024 09:30

General

  • Target

    59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    59b5865ebfc97a5f60613ec1215a0cac

  • SHA1

    4b24442a00ed2954538164f5f0537f60adde0a0b

  • SHA256

    a4a8cca75b62ca120cda2043d5cb7ea48bfba05da6bf9cd58f6af101151e0634

  • SHA512

    74de4eb07b330247bda011b2e8a0104a21b90252a77db3e18e3813518d2ee31d4c1b962c4e8bbd4e65a9923c2197d9557c78e152a47d2fa8e526b831d87df6c2

  • SSDEEP

    6144:FmvcIPl07bAHPcdS/mG4U9cozMsYbVW8M6F:FmvcIPl07bAHPcdymTBbV/M6F

Malware Config

Extracted

Family

netwire

C2

extensions14718.sytes.net:3324

extensions14718sec.sytes.net:3324

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    YbcwLUQv

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 9 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops startup file 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES732.tmp" "c:\Users\Admin\AppData\Local\Temp\yvsgbz2o\CSC47856CD220584181901F476423411F9D.TMP"
        3⤵
          PID:2616
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
        2⤵
          PID:2216

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES732.tmp

        Filesize

        1KB

        MD5

        d8d266c587a09794ee1da8ca88678aa0

        SHA1

        76e133ebf91a16dc714ef367279118214856ca7b

        SHA256

        727acc2e7026cc3b690b0f88dbf2012bfb12022cf276c931419eea4a2ff495cc

        SHA512

        1e168e8d4882a381ad42447b7d88360fdc81ba868ef4b94154301dc1863ee9af970019a7f9635b2e0076fc768c781e1926ed8b0abc01a27049c048c33e57d3a4

      • C:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.dll

        Filesize

        13KB

        MD5

        7f3703f0cff2774d64a593753058bdc4

        SHA1

        edd1a2bb769f9c12b570fe904a59d1d7154b3f64

        SHA256

        4a0658e951468b8b9ab013f4e285dbe824c25c37af024a0cc07cb359290d3715

        SHA512

        ff9925d30b02b6d7c15b2b861eb023f7a8ff7076df569c8f3d5385ce311fa76ceb97e7304cb9258d4d560e54aa67d883db9d479a87cbaf6d1adea33c28509bad

      • C:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.pdb

        Filesize

        39KB

        MD5

        b957ebd75a12770c0977c489d8ecdbed

        SHA1

        a4e0bcb08ab92ac7b671d0309bab8cfeeab2f110

        SHA256

        0db39526b331bdefa2b1d705b0d74f7d5ec23908027b49f282c5ab93809beb9a

        SHA512

        4eafe0966650213c8b3a3756705b59d1862e963f1dbf3a29f896b2f4cc06f215c38900eafa121a8c9e85e3c3fcbce04495ff1c923c0af0fbc7baac244253d4b1

      • \??\c:\Users\Admin\AppData\Local\Temp\yvsgbz2o\CSC47856CD220584181901F476423411F9D.TMP

        Filesize

        1KB

        MD5

        846979a6dc23147caf13a264c74c8ae0

        SHA1

        dac0206bfe326f09a09b12797f50eeb0b5966a45

        SHA256

        a5196611b60e80e5d13b2c875757f08a659d23b48f17e7f62d88079ddb180349

        SHA512

        64a86f2f8d452e8d0c9465bf9a51c37dba308bd7ae6ed25cfe920975bd954415798de52152517ffd92527e4cd2f8594a201a75605496b7a3eee3e436f4a6336b

      • \??\c:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.0.cs

        Filesize

        23KB

        MD5

        1f0fa9f72871b64abd914263debfee66

        SHA1

        84a520e95ce5db685cb9c99f6416b1552bd7ab85

        SHA256

        07941407df2f3b23aeebbf700083235d8c50e8311a9fb77e5d196c09a466ad38

        SHA512

        ee572879a2cb289430efa4ab9305a42ac612f9f6b9efeac8422c1bfd25616f3ee2545008fa8b163529d4194c44b66c0dd812957fbb38aa5cee1346f3d6260af9

      • \??\c:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.cmdline

        Filesize

        312B

        MD5

        30dcf0b325cb16825271b7827a590796

        SHA1

        805f0065f2aead020bdbd1d2b3aa51d4fffec572

        SHA256

        38382dbf6ec92053b7e4f3e1785bd4aa4bdb9cc2e9fd2c1638d40b0863e16682

        SHA512

        4ad77abb7a273542ede4976d8fee9a7726a758b0b1207b541b93bbc1464675510ee006bb67f25db1a46f2009112d4cb9d5ec3eda4ce5eba54fc3e302dd79ef90

      • memory/2216-32-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-30-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-50-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-43-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-42-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-40-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-28-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-24-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-26-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-38-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2216-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2216-34-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2256-0-0x000000007414E000-0x000000007414F000-memory.dmp

        Filesize

        4KB

      • memory/2256-5-0x0000000074140000-0x000000007482E000-memory.dmp

        Filesize

        6.9MB

      • memory/2256-23-0x0000000000BF0000-0x0000000000C1C000-memory.dmp

        Filesize

        176KB

      • memory/2256-20-0x0000000000730000-0x000000000073C000-memory.dmp

        Filesize

        48KB

      • memory/2256-19-0x0000000000A10000-0x0000000000A42000-memory.dmp

        Filesize

        200KB

      • memory/2256-41-0x0000000074140000-0x000000007482E000-memory.dmp

        Filesize

        6.9MB

      • memory/2256-17-0x0000000000360000-0x000000000036A000-memory.dmp

        Filesize

        40KB

      • memory/2256-1-0x0000000000CE0000-0x0000000000D1E000-memory.dmp

        Filesize

        248KB