Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe
-
Size
393KB
-
MD5
1936832fc3fa98eb6e6ab8b2bcf06035
-
SHA1
cc25ac3fb94fe6409fa8a661f1ad9aa11bdd8306
-
SHA256
3b64f3a5655db4fd8e54db5398e5527e77f9731b80ff22378caae7b2d631437d
-
SHA512
fabeaca361f7a4bdcca12a767113e84e2248892cef7a6237c03674fb05f3eb1b93ac5a78536766ca3ccb5bf5cdd2091e713e9403189aed223b79e51650a04ca5
-
SSDEEP
6144:mCbQchTwXNYeiLX4AmFrcPKSdj/4KngWIq6jRkbkN:l7hTwXifX4TFgSSKKngWIjok
Malware Config
Extracted
netwire
mlhdns.phatbois.me:4772
mlhdns.pandabearsunited.xyz:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/3572-5-0x00000000051C0000-0x00000000051E0000-memory.dmp family_zgrat_v1 -
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1920-13-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1920-15-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 mhhkjk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\mhhkjk.exe -boot" mhhkjk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4888 set thread context of 1920 4888 mhhkjk.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe Token: SeDebugPrivilege 4888 mhhkjk.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3572 wrote to memory of 4920 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 96 PID 3572 wrote to memory of 4920 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 96 PID 3572 wrote to memory of 4920 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 96 PID 3572 wrote to memory of 4140 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 98 PID 3572 wrote to memory of 4140 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 98 PID 3572 wrote to memory of 4140 3572 1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe 98 PID 4892 wrote to memory of 4888 4892 explorer.exe 102 PID 4892 wrote to memory of 4888 4892 explorer.exe 102 PID 4892 wrote to memory of 4888 4892 explorer.exe 102 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106 PID 4888 wrote to memory of 1920 4888 mhhkjk.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe"2⤵
- Drops startup file
PID:4920
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe"2⤵PID:4140
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mhhkjk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD51936832fc3fa98eb6e6ab8b2bcf06035
SHA1cc25ac3fb94fe6409fa8a661f1ad9aa11bdd8306
SHA2563b64f3a5655db4fd8e54db5398e5527e77f9731b80ff22378caae7b2d631437d
SHA512fabeaca361f7a4bdcca12a767113e84e2248892cef7a6237c03674fb05f3eb1b93ac5a78536766ca3ccb5bf5cdd2091e713e9403189aed223b79e51650a04ca5