Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 00:02

General

  • Target

    f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe

  • Size

    363KB

  • MD5

    f1583cede77b634f2dd7f8807319d4f0

  • SHA1

    5e87a07e3843f7fa3e190ef47f7a8e268e7533c8

  • SHA256

    f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3

  • SHA512

    858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d

  • SSDEEP

    6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu

Malware Config

Extracted

Family

netwire

C2

88.119.175.41:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    Olu

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    iGVOQFlr

  • offline_keylogger

    true

  • password

    Ktgv4%+,%S

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Signatures

  • NetWire RAT payload 11 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        3⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        /c net stop MpsSvc
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\SysWOW64\net.exe
          net stop MpsSvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop MpsSvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2856
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\Host.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
            5⤵
              PID:2784
            • C:\Windows\SysWOW64\cmd.exe
              /c net stop MpsSvc
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2580
              • C:\Windows\SysWOW64\net.exe
                net stop MpsSvc
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1976
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop MpsSvc
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:1940
            • C:\Users\Admin\AppData\Roaming\Install\Host.exe
              C:\Users\Admin\AppData\Roaming\Install\Host.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:2552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cm_

      Filesize

      128KB

      MD5

      654ac265df471b3b1747695fa19cc226

      SHA1

      1a0b7674e906b8661977c17c74f66b2172524085

      SHA256

      f1ead6d6c1b1515a0f781783cf8f929cd403aeaaeaef55ee03c3c1e7a983148a

      SHA512

      5a23074054cc8261f77835d55355cecaf3914982ca4bc705bce0f29a259fea6b750b65e753ec1d98b2c4d4e4f893426ccdc3d1451899e7247e5d903bb0ee0f21

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd

      Filesize

      408KB

      MD5

      de8517147501bb8972fb16635580f3ba

      SHA1

      7f806c1ceca11217110c85ffb8ce4d076179b40a

      SHA256

      d7a3315f872243c28bd95fb75ed3b007821a2dea25f78afd8cbaaca1d853ef4f

      SHA512

      c6dd32cd44569e9367ae447791c1554903bdba7c35729e46cdfec8cbdd3194aa192cdc95fe224917b7cf7c8c7818cb0da0bf787d59e7e4dbad925dd8426d940f

    • memory/2552-90-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2552-88-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2892-34-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-28-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-52-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2892-26-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-51-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-30-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-25-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-36-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-43-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-41-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-39-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-32-0x0000000000400000-0x0000000000FB8000-memory.dmp

      Filesize

      11.7MB

    • memory/2892-22-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2932-19-0x0000000000250000-0x0000000000255000-memory.dmp

      Filesize

      20KB