Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 00:02

General

  • Target

    f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe

  • Size

    363KB

  • MD5

    f1583cede77b634f2dd7f8807319d4f0

  • SHA1

    5e87a07e3843f7fa3e190ef47f7a8e268e7533c8

  • SHA256

    f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3

  • SHA512

    858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d

  • SSDEEP

    6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu

Malware Config

Extracted

Family

netwire

C2

88.119.175.41:3365

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    true

  • host_id

    Olu

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    iGVOQFlr

  • offline_keylogger

    true

  • password

    Ktgv4%+,%S

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    true

Signatures

  • NetWire RAT payload 6 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        3⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3980
      • C:\Windows\SysWOW64\cmd.exe
        /c net stop MpsSvc
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3236
        • C:\Windows\SysWOW64\net.exe
          net stop MpsSvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4220
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop MpsSvc
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1920
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3136
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\Host.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
            5⤵
            • Drops startup file
            • System Location Discovery: System Language Discovery
            PID:2152
          • C:\Windows\SysWOW64\cmd.exe
            /c net stop MpsSvc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Windows\SysWOW64\net.exe
              net stop MpsSvc
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4564
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop MpsSvc
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4076
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            C:\Users\Admin\AppData\Roaming\Install\Host.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:3460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cm_

    Filesize

    128KB

    MD5

    654ac265df471b3b1747695fa19cc226

    SHA1

    1a0b7674e906b8661977c17c74f66b2172524085

    SHA256

    f1ead6d6c1b1515a0f781783cf8f929cd403aeaaeaef55ee03c3c1e7a983148a

    SHA512

    5a23074054cc8261f77835d55355cecaf3914982ca4bc705bce0f29a259fea6b750b65e753ec1d98b2c4d4e4f893426ccdc3d1451899e7247e5d903bb0ee0f21

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd

    Filesize

    408KB

    MD5

    de8517147501bb8972fb16635580f3ba

    SHA1

    7f806c1ceca11217110c85ffb8ce4d076179b40a

    SHA256

    d7a3315f872243c28bd95fb75ed3b007821a2dea25f78afd8cbaaca1d853ef4f

    SHA512

    c6dd32cd44569e9367ae447791c1554903bdba7c35729e46cdfec8cbdd3194aa192cdc95fe224917b7cf7c8c7818cb0da0bf787d59e7e4dbad925dd8426d940f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs

    Filesize

    110B

    MD5

    0c34c1e07c3a00dd4f6c4185b40c66c4

    SHA1

    980a47c9c6d44ddff853282e903a4b561fac5942

    SHA256

    9c50ec3824a267d8756bc8e137bff24126afb044937468a507cb688a1a31fdf6

    SHA512

    4db5410845364484f4d9bdb9766d5e235095d7d65f8488fb9faa9cf06bc19a597bee03571a4e09be9c598d36da5b91f8feb2afcdedd028920e9672ef2cb81355

  • memory/2096-18-0x0000000000400000-0x0000000000FB8000-memory.dmp

    Filesize

    11.7MB

  • memory/2096-26-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2096-22-0x0000000000400000-0x0000000000FB8000-memory.dmp

    Filesize

    11.7MB

  • memory/2096-20-0x0000000000400000-0x0000000000FB8000-memory.dmp

    Filesize

    11.7MB

  • memory/3292-13-0x00000000020F0000-0x00000000020F5000-memory.dmp

    Filesize

    20KB

  • memory/3460-40-0x0000000000400000-0x0000000000FB8000-memory.dmp

    Filesize

    11.7MB

  • memory/3460-43-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB