Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
Malware Config
Extracted
netwire
agencies.duckdns.org:10130
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
travels
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
webmonitor
sanders.wm01.to:443
-
config_key
BvzaT1rL9C6tpOhPi8yqPN03WnzPPc6c
-
private_key
oz5d2fXwy
-
url_path
/recv4.php
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2152-8-0x0000000005B60000-0x0000000005BF6000-memory.dmp netwire behavioral2/memory/664-39-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/664-42-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/664-44-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/664-48-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/2776-45-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-46-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-47-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-49-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-50-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-51-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-52-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-54-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-55-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-56-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-57-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-58-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/2776-59-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exeFilename.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Filename.exe -
Executes dropped EXE 2 IoCs
Processes:
ca718c3cf435c0aeb86e8c0d16721eeb.exeFilename.exepid process 2776 ca718c3cf435c0aeb86e8c0d16721eeb.exe 3308 Filename.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe upx behavioral2/memory/2776-16-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-45-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-46-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-47-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-49-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-50-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-51-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-52-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-54-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-55-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-56-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-57-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-58-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/2776-59-0x0000000000400000-0x00000000004E9000-memory.dmp upx -
Unexpected DNS network traffic destination 16 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 114.114.114.114 Destination IP 77.88.8.8 Destination IP 139.175.55.244 Destination IP 114.114.114.114 Destination IP 123.125.81.6 Destination IP 180.76.76.76 Destination IP 77.88.8.8 Destination IP 89.233.43.71 Destination IP 139.175.55.244 Destination IP 101.226.4.6 Destination IP 123.125.81.6 Destination IP 180.76.76.76 Destination IP 101.226.4.6 Destination IP 91.239.100.100 Destination IP 1.2.4.8 Destination IP 1.2.4.8 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DsvHelper\\Filename.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Filename.exedescription pid process target process PID 3308 set thread context of 664 3308 Filename.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exeFilename.execmd.exedescription pid process target process PID 2152 wrote to memory of 2776 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 2152 wrote to memory of 2776 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 2152 wrote to memory of 2776 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe ca718c3cf435c0aeb86e8c0d16721eeb.exe PID 2152 wrote to memory of 3308 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 2152 wrote to memory of 3308 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 2152 wrote to memory of 3308 2152 7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe Filename.exe PID 3308 wrote to memory of 1636 3308 Filename.exe cmd.exe PID 3308 wrote to memory of 1636 3308 Filename.exe cmd.exe PID 3308 wrote to memory of 1636 3308 Filename.exe cmd.exe PID 1636 wrote to memory of 3720 1636 cmd.exe reg.exe PID 1636 wrote to memory of 3720 1636 cmd.exe reg.exe PID 1636 wrote to memory of 3720 1636 cmd.exe reg.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe PID 3308 wrote to memory of 664 3308 Filename.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe" -n2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f4⤵
- Adds Run key to start application
PID:3720
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:664
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1712 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dd65dfa473fde90a9bd6ab724cbf006c
SHA14c146a7fdc77f4f0990cc3f8733e2ecf944f2bd3
SHA256077ad8b2159d696da0c50ea5279220bbbdbd4f2415946336ac531dcba7028b56
SHA5121d5cd1a5e6f5c3bf4e851f9c7d5623aa978e7e0be6e289884bb347fe61a54e5fefee5f9f1f6d89efafdacbb8b7a346b8466cdbafd382123ce173444790a28fd9
-
Filesize
1.0MB
MD57d35267608831170c47e95b5f967ca0c
SHA12896d1e9e30e6734fcaaeef9a3f969ce920e8672
SHA256f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
SHA512b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45