Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/07/2024, 20:23

General

  • Target

    5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe

  • Size

    338KB

  • MD5

    5ddc4cf0dad4b869b441a26e67444b73

  • SHA1

    5cba29927759776c9f1a7b10d5fec27c863035e3

  • SHA256

    839a5b4bc0c1e8d395e5b179a9e09dcbe9fb11d303595a1ade543c9873601312

  • SHA512

    cad6d15988b8b3c1921e6eab951812c4ed74f2956cdfaf666ccff9b35ddb34ed5d79fad9c49bfbaef09f87296861bedbc0f57be4f2d2a13937998c0b8a81f232

  • SSDEEP

    6144:DrMD6jcT15zUAVp4AE33eBQ4suHaxZ29eBRdN:3UgcTn5Vp4AxlQjBj

Malware Config

Extracted

Family

netwire

C2

dps5000.duckdns.org:3360

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    C:\Users\Admin\AppData\Roaming\Filefox\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Windows\SysWOW64\help.exe
      "C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\GoogleInc\GoogleInc.exe

    Filesize

    338KB

    MD5

    37870dde351d805bc433b1555b7b47bd

    SHA1

    0fcf39409c8225be53faf670b467c278e39ad527

    SHA256

    0c88e2c1346be5aad30333b653f39f33fced5271c703b2c284d0a55e17d7bc97

    SHA512

    626f34d45594b5c26293789ea23295c879e7f7620ddad5b323b86cd19bf4b7998a8e8c926126c5489f5d1b92fc08db07ec770c4ffc516b37d694f5d41ef9e9f6

  • C:\Users\Admin\AppData\Local\GoogleInc\GoogleInc.lnk

    Filesize

    1016B

    MD5

    1a3ed671cee916f75bacd5ead5446619

    SHA1

    01f86a552db3f2df58ff6c3721cb231e1a38264e

    SHA256

    a056fafd7bed6c91d49bd4145af5d33124c0fd07a1a47da4c80b0f21cdf28406

    SHA512

    3a7841327a17a5b034269dde80c65c44b3f95b7a91e2d227808244084baff2434227d081cb28e96400502e17c71c715254d1ea17205e9642bb59f623672924f7

  • C:\Users\Admin\AppData\Local\Temp\HhqQc1TDyBCLKGiUNWDZ

    Filesize

    143KB

    MD5

    64586fb2a58c222a19473417f382d45a

    SHA1

    dff07ec732118e6efb55d7cfad647dd33ac49d6c

    SHA256

    8ae437e28813d4d2e3c8551b22de36385133db8b3c9f68ddcc226f09b1e328d0

    SHA512

    abcd80e1c357d2e302be5e048d0e4b344de560d57c25084d754574e79d7ed391bf6db3f8bd640bf9abca75ec8849d3ccce490f4b03d6b12b39a2f111e1e3a67d

  • memory/368-0-0x0000000002350000-0x0000000002354000-memory.dmp

    Filesize

    16KB

  • memory/368-1-0x0000000002410000-0x000000000246A000-memory.dmp

    Filesize

    360KB

  • memory/368-3-0x0000000077508000-0x0000000077509000-memory.dmp

    Filesize

    4KB

  • memory/368-2-0x0000000002550000-0x00000000026F3000-memory.dmp

    Filesize

    1.6MB

  • memory/368-4-0x0000000002450000-0x0000000002540000-memory.dmp

    Filesize

    960KB

  • memory/368-5-0x00000000025D0000-0x00000000027E5000-memory.dmp

    Filesize

    2.1MB

  • memory/712-31-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB