General

  • Target

    636fe98bde392f519b60e46f80dbbda5_JaffaCakes118

  • Size

    419KB

  • Sample

    240521-qlqpeafd51

  • MD5

    636fe98bde392f519b60e46f80dbbda5

  • SHA1

    1d174d0235c74b87011d0ac4cb5097b533c41163

  • SHA256

    8de3dda2e65faa4fffcac28429edb1dbd767edbfebf45314cba0269c3a4e6933

  • SHA512

    1eaa2fb0d90a8e4119875904d26d0b50aa882f62bd149aefc0c8a3919f4e439e9dc0289105ea1497d6b619e7b60039557d8f8d46b424cb5fbb3f0b75562aa805

  • SSDEEP

    12288:JFtRqnzyWrELTwWjhC7mQBN097mSOQcT:T+nzyWrEQ7mloSvcT

Malware Config

Extracted

Family

netwire

C2

sepp.myq-see.com:2001

Attributes
  • activex_autorun

    true

  • activex_key

    {50L4QLIK-5N0E-1U7P-5W65-RDN0R6N72FF0}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    XdWObmml

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      636fe98bde392f519b60e46f80dbbda5_JaffaCakes118

    • Size

      419KB

    • MD5

      636fe98bde392f519b60e46f80dbbda5

    • SHA1

      1d174d0235c74b87011d0ac4cb5097b533c41163

    • SHA256

      8de3dda2e65faa4fffcac28429edb1dbd767edbfebf45314cba0269c3a4e6933

    • SHA512

      1eaa2fb0d90a8e4119875904d26d0b50aa882f62bd149aefc0c8a3919f4e439e9dc0289105ea1497d6b619e7b60039557d8f8d46b424cb5fbb3f0b75562aa805

    • SSDEEP

      12288:JFtRqnzyWrELTwWjhC7mQBN097mSOQcT:T+nzyWrEQ7mloSvcT

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Modifies Installed Components in the registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks