Analysis Overview
SHA256
370c78ecd539292a20e84dd4f58aaf5194a3b0db5ea857adfd46b50d6333426a
Threat Level: Known bad
The file e8ef02beaf986390fcb537d1cb3d6a51_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
NetWire RAT payload
Netwire
Drops startup file
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-09 01:47
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-09 01:47
Reported
2024-04-09 01:50
Platform
win7-20240221-en
Max time kernel
118s
Max time network
122s
Command Line
Signatures
NetWire RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Netwire
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mm.exe.exe | C:\Windows\SysWOW64\DllHost.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Processes
C:\Users\Admin\AppData\Local\Temp\e8ef02beaf986390fcb537d1cb3d6a51_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e8ef02beaf986390fcb537d1cb3d6a51_JaffaCakes118.exe"
C:\Windows\SysWOW64\DllHost.exe
C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
Network
| Country | Destination | Domain | Proto |
| CA | 173.209.48.226:3360 | tcp | |
| CA | 173.209.48.226:3360 | tcp |
Files
memory/2008-0-0x0000000000170000-0x00000000001EB000-memory.dmp
memory/2008-1-0x00000000770BF000-0x00000000770C0000-memory.dmp
memory/2008-4-0x00000000020F0000-0x0000000002270000-memory.dmp
memory/2008-5-0x0000000002F30000-0x0000000002F63000-memory.dmp
memory/2008-6-0x0000000000170000-0x00000000001EB000-memory.dmp
memory/2008-7-0x0000000002F30000-0x0000000002F63000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-09 01:47
Reported
2024-04-09 01:50
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
NetWire RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Netwire
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mm.exe.exe | C:\Windows\SysWOW64\DllHost.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mm.exe.exe | C:\Windows\SysWOW64\DllHost.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Processes
C:\Users\Admin\AppData\Local\Temp\e8ef02beaf986390fcb537d1cb3d6a51_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e8ef02beaf986390fcb537d1cb3d6a51_JaffaCakes118.exe"
C:\Windows\SysWOW64\DllHost.exe
C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
Network
| Country | Destination | Domain | Proto |
| CA | 173.209.48.226:3360 | tcp | |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| CA | 173.209.48.226:3360 | tcp | |
| US | 8.8.8.8:53 | udp |
Files
memory/1528-0-0x0000000002450000-0x00000000024CB000-memory.dmp
memory/1528-1-0x0000000077C02000-0x0000000077C03000-memory.dmp
memory/1528-5-0x0000000003180000-0x00000000031B3000-memory.dmp
memory/1528-4-0x00000000024D0000-0x0000000002673000-memory.dmp
memory/1528-6-0x0000000002780000-0x0000000002870000-memory.dmp
memory/1528-7-0x0000000002450000-0x00000000024CB000-memory.dmp
memory/1528-9-0x0000000003180000-0x00000000031B3000-memory.dmp