Analysis

  • max time kernel
    147s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 23:15

General

  • Target

    3c8aa9482e04955247407008a9a58de4_JaffaCakes118.exe

  • Size

    534KB

  • MD5

    3c8aa9482e04955247407008a9a58de4

  • SHA1

    2a8c593fffc721c68511d2667fe5f02e4da78f1e

  • SHA256

    d9a5c16a13ec68f0548a6db05db2439d6296b4704c6ee480aa0d659f77d04f4d

  • SHA512

    afd17edd4fe4d93a31acbb8e9ae67311e33e30408c77ce4f5316414376d1500078e092538a03d5f13fea725e17daa4642cb30a78f4a80045bafd769daf8cc735

  • SSDEEP

    12288:aH/9cLouxk5R7hNeqVIVZ7uDQMhAVb7YrK0L6YA:af9Uo4k5NhNfcZKDkbk

Malware Config

Extracted

Family

netwire

C2

mikebaur.ddns.net:3361

Attributes
  • activex_autorun

    true

  • activex_key

    {6388V52T-OO22-RNFN-00O6-B48721FMJK8H}

  • copy_executable

    false

  • delete_original

    true

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    false

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c8aa9482e04955247407008a9a58de4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c8aa9482e04955247407008a9a58de4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Roaming\Hosstt.exe
      "C:\Users\Admin\AppData\Roaming\Hosstt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Users\Admin\AppData\Roaming\Hosstt.exe
        "C:\Users\Admin\AppData\Roaming\Hosstt.exe"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4348
    • C:\Users\Admin\AppData\Local\Temp\3c8aa9482e04955247407008a9a58de4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3c8aa9482e04955247407008a9a58de4_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Hosstt.exe

    Filesize

    202KB

    MD5

    93b56794066bef1420190d63c2093cfd

    SHA1

    10385882fca74eeb4f6a285b676c9b8f68f13e20

    SHA256

    64b841c74d8c3fa0e3218b94e85c56c95a51720447d71dcbf888015589c7dd1a

    SHA512

    75f18a361dc9205f05f9215b392f3645b9d895bdb67cb75924d6e2632c91e9cc60a3b99c7accd487b28255e341294680dd7ed5402a677b1182f44b7fdf189918

  • C:\Users\Admin\My Documents\New text document.txt

    Filesize

    32B

    MD5

    00eafb463d92c03a7c860e54416cfb0a

    SHA1

    2306c1bbbb7edccb8848eb0d0f62d75260b68c07

    SHA256

    617c5013080357ddd7761f9ee0d6a9914b001b81624a2d0c73939bad873c6b65

    SHA512

    5b8b4dab9e40f25ec637df0b9bfa2156887b95abbf956b2271858758e33f705674d220f986f28f3851f96dca6bc8a4cdd9567adc8bdb3b216c74aeb62d68664c

  • memory/1808-6-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-4-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-23-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-5-0x0000000075242000-0x0000000075243000-memory.dmp

    Filesize

    4KB

  • memory/1808-0-0x0000000075242000-0x0000000075243000-memory.dmp

    Filesize

    4KB

  • memory/1808-2-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-3-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-1-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-22-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-31-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-24-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-41-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-34-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-32-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2968-25-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2968-30-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2968-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2968-27-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2968-26-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4348-36-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4348-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4348-39-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4348-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB