Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe
-
Size
561KB
-
MD5
21daa55b09213ecdee0108b027b3aa53
-
SHA1
c6eb2d539531355ce9ce22fe029f0934065dbb7d
-
SHA256
e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
-
SHA512
c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95
-
SSDEEP
6144:C4xWH5KrIJU1TJqy4P5z4xWH5KrIJUXa+GAsebVLS37btJWB5DURZov5:OKbl0PnKHVseiBEBNt
Malware Config
Extracted
netwire
185.163.100.31:3364
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Frank321
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1836-14-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1836-16-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2072 Windows Utility.exe 1836 Windows Utility.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Utility.exe -boot" Windows Utility.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 1836 2072 Windows Utility.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe Token: SeDebugPrivilege 2072 Windows Utility.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2896 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2896 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2896 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2896 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2736 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2736 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2736 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2736 2052 21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2072 2644 explorer.exe 32 PID 2644 wrote to memory of 2072 2644 explorer.exe 32 PID 2644 wrote to memory of 2072 2644 explorer.exe 32 PID 2644 wrote to memory of 2072 2644 explorer.exe 32 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35 PID 2072 wrote to memory of 1836 2072 Windows Utility.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\21daa55b09213ecdee0108b027b3aa53_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵PID:2896
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵PID:2736
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\Windows Utility.exe"C:\Users\Admin\AppData\Roaming\Windows Utility.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\Windows Utility.exe"C:\Users\Admin\AppData\Roaming\Windows Utility.exe"3⤵
- Executes dropped EXE
PID:1836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
561KB
MD521daa55b09213ecdee0108b027b3aa53
SHA1c6eb2d539531355ce9ce22fe029f0934065dbb7d
SHA256e71b74e56460d3306316281d116cbf56074788efcbb34f6f077ffdd10c8dbc02
SHA512c867f302deb1bd43bcb3ba65a9cd493f4dfc9a57b8863239afb4c380e78ca8d5c3a4bc0bb2bd11698944c5bbf7cf1b689f12229f2c06108c1aa4f111465b9d95