Analysis

  • max time kernel
    95s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 12:56

General

  • Target

    JaffaCakes118_c1e062e933fc6527e29e761d59e2d7d9c3847e78202450d76028aaa2c8d82f6b.exe

  • Size

    328KB

  • MD5

    82b6c935946049119286ed8516f04924

  • SHA1

    fa8db16d6a13dc907f4c4fda55d03f8887dc1286

  • SHA256

    c1e062e933fc6527e29e761d59e2d7d9c3847e78202450d76028aaa2c8d82f6b

  • SHA512

    b96fbac28686e3747fe12279fe802eb604b2c3d054e0f4fad73e2c5a3ff06e9ae14bf8d8031f3d045dbf1d252aa360da696488dd5b6536ac187128a0475ccabc

  • SSDEEP

    6144:Nbhnot4+sbOAtbkfHLDiT6OzR8Q0l+/NyqRKbhoXqqD8Xi8B:Nlnot4+UwLDiT6OzR8llAgqQB

Malware Config

Signatures

  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1e062e933fc6527e29e761d59e2d7d9c3847e78202450d76028aaa2c8d82f6b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1e062e933fc6527e29e761d59e2d7d9c3847e78202450d76028aaa2c8d82f6b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1128
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 216
      2⤵
      • Program crash
      PID:2464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1128 -ip 1128
    1⤵
      PID:4964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1128-0-0x0000000000550000-0x00000000005A2000-memory.dmp

      Filesize

      328KB