Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
Malware Config
Extracted
netwire
agencies.duckdns.org:10130
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
travels
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
webmonitor
sanders.wm01.to:443
-
config_key
BvzaT1rL9C6tpOhPi8yqPN03WnzPPc6c
-
private_key
oz5d2fXwy
-
url_path
/recv4.php
Signatures
-
NetWire RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-3-0x0000000001EB0000-0x0000000001F46000-memory.dmp netwire behavioral1/memory/3012-13-0x0000000005260000-0x0000000005349000-memory.dmp netwire behavioral1/memory/240-45-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-47-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-49-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-52-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-55-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-56-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/240-59-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/2544-57-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-58-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-60-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-61-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-63-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-65-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-66-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-68-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-70-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2544-71-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor -
Executes dropped EXE 2 IoCs
Processes:
ca718c3cf435c0aeb86e8c0d16721eeb.exeFilename.exepid process 2544 ca718c3cf435c0aeb86e8c0d16721eeb.exe 2420 Filename.exe -
Loads dropped DLL 5 IoCs
Processes:
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exeFilename.exepid process 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe 2420 Filename.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe upx behavioral1/memory/2544-14-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-57-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-58-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-60-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-61-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-63-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-65-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-66-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-68-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-70-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2544-71-0x0000000000400000-0x00000000004E9000-memory.dmp upx -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 1.2.4.8 Destination IP 123.125.81.6 Destination IP 139.175.55.244 Destination IP 89.233.43.71 Destination IP 77.88.8.8 Destination IP 101.226.4.6 Destination IP 91.239.100.100 Destination IP 1.2.4.8 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DsvHelper\\Filename.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Filename.exedescription pid process target process PID 2420 set thread context of 240 2420 Filename.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exeFilename.execmd.exedescription pid process target process PID 3012 wrote to memory of 2544 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 3012 wrote to memory of 2544 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 3012 wrote to memory of 2544 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 3012 wrote to memory of 2544 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 3012 wrote to memory of 2420 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 3012 wrote to memory of 2420 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 3012 wrote to memory of 2420 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 3012 wrote to memory of 2420 3012 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 2420 wrote to memory of 268 2420 Filename.exe cmd.exe PID 2420 wrote to memory of 268 2420 Filename.exe cmd.exe PID 2420 wrote to memory of 268 2420 Filename.exe cmd.exe PID 2420 wrote to memory of 268 2420 Filename.exe cmd.exe PID 268 wrote to memory of 324 268 cmd.exe reg.exe PID 268 wrote to memory of 324 268 cmd.exe reg.exe PID 268 wrote to memory of 324 268 cmd.exe reg.exe PID 268 wrote to memory of 324 268 cmd.exe reg.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe PID 2420 wrote to memory of 240 2420 Filename.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe" -n2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f4⤵
- Adds Run key to start application
PID:324
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dd65dfa473fde90a9bd6ab724cbf006c
SHA14c146a7fdc77f4f0990cc3f8733e2ecf944f2bd3
SHA256077ad8b2159d696da0c50ea5279220bbbdbd4f2415946336ac531dcba7028b56
SHA5121d5cd1a5e6f5c3bf4e851f9c7d5623aa978e7e0be6e289884bb347fe61a54e5fefee5f9f1f6d89efafdacbb8b7a346b8466cdbafd382123ce173444790a28fd9
-
Filesize
1.0MB
MD57d35267608831170c47e95b5f967ca0c
SHA12896d1e9e30e6734fcaaeef9a3f969ce920e8672
SHA256f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
SHA512b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45