Analysis

  • max time kernel
    135s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 17:35

General

  • Target

    a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe

  • Size

    10.2MB

  • MD5

    a37a802f3cb72830c06c3eae532fe402

  • SHA1

    cb08cf20440e0326e9336e25353481cb4689b420

  • SHA256

    5eeab5d3d9d56bf0fc46b37c47cab9e2c60b6052df49ead55aa555cb63ad66ac

  • SHA512

    dc2649adce477126785b4268d7a3b6e7cfb92d5fbf6f7b36c76593f536b7b672b60bf39e26b203f1a193570e2ce60e623e0612a7a63756ada247c96f96c9e0a6

  • SSDEEP

    98304:W1DsMqv8YwRfS5fqDADzBBQ/ldfii/o7/iAXflijzJk/d3tz:wDXJYwRf+CyBB8tSXf66d3tz

Malware Config

Extracted

Family

netwire

C2

reroutetraffic.io:4548

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    bprn2x

  • keylogger_dir

    %AppData%\SanderApp\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    iT5HZYc8pnFOlw3JAF8gfKBQcUZrrOyZ

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4428
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3884,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
    1⤵
      PID:1104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/572-1-0x0000000077107000-0x0000000077108000-memory.dmp

      Filesize

      4KB

    • memory/572-2-0x0000000000A00000-0x0000000000A02000-memory.dmp

      Filesize

      8KB

    • memory/572-6-0x0000000002710000-0x0000000002718000-memory.dmp

      Filesize

      32KB

    • memory/572-7-0x0000000005C50000-0x0000000005C8F000-memory.dmp

      Filesize

      252KB

    • memory/572-10-0x0000000005C50000-0x0000000005C8F000-memory.dmp

      Filesize

      252KB

    • memory/2980-0-0x00000000031D0000-0x00000000031DA000-memory.dmp

      Filesize

      40KB

    • memory/2980-3-0x00000000031D0000-0x00000000031DA000-memory.dmp

      Filesize

      40KB

    • memory/2980-4-0x0000000000400000-0x0000000000E64000-memory.dmp

      Filesize

      10.4MB

    • memory/4428-8-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB