Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 18:45

General

  • Target

    JaffaCakes118_ed35c68140708c925b977f312b250bc247ddabcd52151be10d6d655d1ffe3b12.js

  • Size

    499KB

  • MD5

    de8a349133f1e75d532abf15ed1b063a

  • SHA1

    804c7e853d2fa70b6ccb52b3b1866f79f3745988

  • SHA256

    ed35c68140708c925b977f312b250bc247ddabcd52151be10d6d655d1ffe3b12

  • SHA512

    c6eeeeb44eaebd507ffbfd52c3f61036dba218125ac17b83ec47fcd5fe68c276e25be2d38b06293c09077e5bdfbfbc68b72ba6814a27fbbb9082b0622b41274a

  • SSDEEP

    6144:D3F/dnFZnDkmbaw89FIPlplie1u89w7ipeoyPcEURraUrkSk0D1XZaV694uBp5Mz:x/lbDkmbawsF2blBu8eipe1cjPCpzdf

Malware Config

Extracted

Family

netwire

C2

kingshakes1.linkpc.net:8181

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Kingshakes

  • install_path

    %AppData%\Windows\Update.exe

  • lock_executable

    false

  • mutex

    cTIkpmVV

  • offline_keylogger

    false

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    false

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed35c68140708c925b977f312b250bc247ddabcd52151be10d6d655d1ffe3b12.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SQFAHJxbPX.js"
      2⤵
        PID:2404
      • C:\Users\Admin\AppData\Roaming\Host.exe
        "C:\Users\Admin\AppData\Roaming\Host.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Users\Admin\AppData\Roaming\Windows\Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows\Update.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Host.exe

      Filesize

      273KB

      MD5

      f1c90f36845cc4a22a26b52bd86f7e60

      SHA1

      d9038069190cccec200bf091f08b7cc8b8302179

      SHA256

      4aee6fa588692eb4735fbe7f13c643daefc23a10a0a64820e1d307501c548c55

      SHA512

      efc415f9de13794fcdb8348b863e931fea9b347981f325bd96cebbb022e855bda81d2f94dca2f9cc0162345d59f20d878ee0e6862f47552e3cb899a3c2c9b4f6

    • C:\Users\Admin\AppData\Roaming\SQFAHJxbPX.js

      Filesize

      1KB

      MD5

      9b66e206a7c5e4e0844c3c82673b1b34

      SHA1

      ecd638530a658d9af9a48ea4b89f9cc8d0429330

      SHA256

      9da6ac74fd2a974e1fe0ccef8d86e5f88fdbaf26e0ea49060fb1fcb9ea9b12ce

      SHA512

      5136e3fb33e2e94650a23c213b9941787978db635fa000e79108518e29a48bd3eb203d5d4fee9452b9ea5f6129c0bf399408d10d8c204d38cbfab0c65ec84334