Analysis

  • max time kernel
    116s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 04:23

General

  • Target

    fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe

  • Size

    616KB

  • MD5

    fe6b9636c6363b1cbcecd2b690408d77

  • SHA1

    c1e7b86bb283116568211eeb200bb4eff457948c

  • SHA256

    f7c37eac5808e804c64864a30eaa565b0cdf35b3738f049ac2e6f793f7603cec

  • SHA512

    6241aa32dc8b80cc42ddce37e25586fb5b84f06a7d7a590c1e87650493f9f805843fd0de350e798e38a155f5901858f60ca5178e24cec0a954d5ca5c14f37776

  • SSDEEP

    12288:mbdH+dbp3YjHGeBGLIdlvdGlRFKQQGoUvW5Vr5UjNaFkX2UHBNxrKU/Ia1SHKUpo:mbdyFyHGGFGF2GoU4Vr5QNa

Malware Config

Extracted

Family

netwire

C2

194.5.97.220:3387

194.5.97.220:3389

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    stanlow02

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LcTkcFsgEPepn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2B51.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:412
    • C:\Users\Admin\AppData\Local\Temp\fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe
      "{path}"
      2⤵
        PID:4152
      • C:\Users\Admin\AppData\Local\Temp\fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe
        "{path}"
        2⤵
          PID:796
        • C:\Users\Admin\AppData\Local\Temp\fe6b9636c6363b1cbcecd2b690408d77_JaffaCakes118.exe
          "{path}"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp2B51.tmp

        Filesize

        1KB

        MD5

        048b4eb3cfd88b3c728f407ec1d0f16a

        SHA1

        a6ef297f53522b2ba5353d75691e6360769190ef

        SHA256

        de5dbb92ac4bc3152bd21aa388c5ade085ef13d31877557f6e31e0d835d63753

        SHA512

        5a5b43b6dfac6fc4b3d15e21be084fd4b65f6a4589c5ec7296fa373432d89bac920a514ddfb87469b914754ab2bfcb72f84328e64f6e2cfccf0eee776ead0d8c

      • memory/880-20-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/880-18-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/880-15-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2068-4-0x0000000075190000-0x0000000075940000-memory.dmp

        Filesize

        7.7MB

      • memory/2068-5-0x00000000052D0000-0x00000000052DA000-memory.dmp

        Filesize

        40KB

      • memory/2068-6-0x0000000005870000-0x0000000005878000-memory.dmp

        Filesize

        32KB

      • memory/2068-7-0x00000000066F0000-0x000000000678C000-memory.dmp

        Filesize

        624KB

      • memory/2068-8-0x000000007519E000-0x000000007519F000-memory.dmp

        Filesize

        4KB

      • memory/2068-9-0x0000000075190000-0x0000000075940000-memory.dmp

        Filesize

        7.7MB

      • memory/2068-10-0x0000000007F20000-0x0000000007FA2000-memory.dmp

        Filesize

        520KB

      • memory/2068-11-0x0000000007DB0000-0x0000000007DE4000-memory.dmp

        Filesize

        208KB

      • memory/2068-0-0x000000007519E000-0x000000007519F000-memory.dmp

        Filesize

        4KB

      • memory/2068-3-0x0000000005310000-0x00000000053A2000-memory.dmp

        Filesize

        584KB

      • memory/2068-2-0x00000000058C0000-0x0000000005E64000-memory.dmp

        Filesize

        5.6MB

      • memory/2068-19-0x0000000075190000-0x0000000075940000-memory.dmp

        Filesize

        7.7MB

      • memory/2068-1-0x0000000000870000-0x0000000000910000-memory.dmp

        Filesize

        640KB