Analysis

  • max time kernel
    128s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 13:47

General

  • Target

    eb761a1a91bbfaf0591793ad3b0f7078_JaffaCakes118.exe

  • Size

    363KB

  • MD5

    eb761a1a91bbfaf0591793ad3b0f7078

  • SHA1

    7e2e8b014beeaec3513040b07fd443f1c9977e8f

  • SHA256

    bc604eb0f4917102c6008795a7837bf2e30910325111d76775d20fb5e3b1e6b9

  • SHA512

    fc86a2ed9236e6c73e2884bb9438b3c495de75d44c9ea4cdb24da05abe0056b665791d50b95008d7bca9b143a08b4d8d46a4f99aefe25d55bf5ade5a28f743e3

  • SSDEEP

    6144:aPCganNu5bp3oqAqAi65pA+Zjy/xXi9ZWgtG90tWTeZ7CdX0xCBnGQ7jBkEpRIIQ:ganaok65pA+aS9ZW54WyMUWJ7mEpAxnD

Malware Config

Extracted

Family

netwire

C2

bushuc009.duckdns.org:1982

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    DP

  • lock_executable

    false

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb761a1a91bbfaf0591793ad3b0f7078_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb761a1a91bbfaf0591793ad3b0f7078_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe Holotype,Bibliopegy
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Holotype.DLL

    Filesize

    41KB

    MD5

    4b02b0b9a0cc891ff025510c605f08bd

    SHA1

    42c00ef177b2b4900eb982096c31c55ea636abe9

    SHA256

    383d775daef2b8cb6c5d055851ca23b1328d3a75edc01d0801ae72f429b667df

    SHA512

    a77ee6c2ef97f2898a4d3007c03a6856d98581251e6160bddd3d5f86ed433a06c5d2edba378abad5a664478b803ac1dd3161de0c74e1f4eacfb8718a08b8843c

  • C:\Users\Admin\AppData\Local\Temp\Physicianship

    Filesize

    176KB

    MD5

    7d95b4820f6530d16a2e5561eb3a77a0

    SHA1

    dc3fdfb7dd644212d196fccd0e3793ad92ca24d7

    SHA256

    dba453915dcfd77df0e7d9c70cd785a8ef2bc6c851d5c368918f00e8ef0376e8

    SHA512

    d7186aeb1ef8728346862f6398e1825912ff28b7cc99ee516cc85b78c837f193359eb4423ca3cc3dce8e07acca1e34a79dfe7fa047d7c63555cd390ffd044401

  • memory/2064-33-0x0000000000170000-0x0000000000172000-memory.dmp

    Filesize

    8KB

  • memory/2064-34-0x0000000074890000-0x00000000748E8000-memory.dmp

    Filesize

    352KB

  • memory/2064-35-0x00000000765F0000-0x0000000076625000-memory.dmp

    Filesize

    212KB

  • memory/2064-39-0x0000000074890000-0x00000000748E8000-memory.dmp

    Filesize

    352KB

  • memory/2764-36-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2764-37-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2764-38-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2764-42-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB