Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 08:08
Behavioral task
behavioral1
Sample
1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe
-
Size
106KB
-
MD5
1b8d28587d6fa9e70e596785d20d823b
-
SHA1
8bff5ea0706c2d79fa858554189d3aee436d4691
-
SHA256
2c073927c214d071178bb4d3fbfb01fa0340a0c927bd0f11eee9ab2c0ee0b9d9
-
SHA512
7755cb47c35a90e0c5c2a703e0f1555946b5003b152ce436eb4627182fdf384f6357514fab3387c452cf89d5ad08b7c85cd0d2f59a7549f0e13f1222c80462cb
-
SSDEEP
3072:995Dyk7LnihwBv8WewMcdTtqIRIjQ4Q5d02//eRX:9f3nihwBkWegdTt9RIjQ4Q5ya/eR
Malware Config
Extracted
netwire
havemercy.mooo.com:3367
-
activex_autorun
true
-
activex_key
{G8448241-80YR-8VL8-2CPD-7WD2AP61UB6C}
-
copy_executable
true
-
delete_original
false
-
host_id
Tuesday
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
UuSgJgwm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
stuo
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0035000000013a3a-2.dat netwire behavioral1/memory/2328-9-0x00000000004B0000-0x00000000004D5000-memory.dmp netwire behavioral1/memory/1012-10-0x00000000004B0000-0x00000000004D5000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{G8448241-80YR-8VL8-2CPD-7WD2AP61UB6C} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{G8448241-80YR-8VL8-2CPD-7WD2AP61UB6C}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Executes dropped EXE 1 IoCs
pid Process 1012 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\stuo = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1012 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe 28 PID 2328 wrote to memory of 1012 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe 28 PID 2328 wrote to memory of 1012 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe 28 PID 2328 wrote to memory of 1012 2328 1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b8d28587d6fa9e70e596785d20d823b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
PID:1012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD51b8d28587d6fa9e70e596785d20d823b
SHA18bff5ea0706c2d79fa858554189d3aee436d4691
SHA2562c073927c214d071178bb4d3fbfb01fa0340a0c927bd0f11eee9ab2c0ee0b9d9
SHA5127755cb47c35a90e0c5c2a703e0f1555946b5003b152ce436eb4627182fdf384f6357514fab3387c452cf89d5ad08b7c85cd0d2f59a7549f0e13f1222c80462cb