Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
3e9467442e5d328b1e6e4f23672e5f5b
-
SHA1
c38c50d58063658b3d428e9e8dd9c501416d98cf
-
SHA256
918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
-
SHA512
29d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97
-
SSDEEP
24576:hu6J33O0c+JY5UZ+XC0kGso6FaQTwzhnpAWY:zu0c++OCvkGs9FahPY
Malware Config
Extracted
netwire
77.48.28.195:1969
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
n2
-
lock_executable
false
-
mutex
JquNADho
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2588-3-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2588-14-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/1704-20-0x00000000000C0000-0x00000000000EC000-memory.dmp netwire behavioral1/memory/1704-28-0x00000000000C0000-0x00000000000EC000-memory.dmp netwire -
Executes dropped EXE 4 IoCs
pid Process 2192 ntoskrnl.exe 1704 ntoskrnl.exe 1328 ntoskrnl.exe 1688 ntoskrnl.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00170000000155d9-16.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2764 set thread context of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2192 set thread context of 1704 2192 ntoskrnl.exe 35 PID 1328 set thread context of 1688 1328 ntoskrnl.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe 1048 schtasks.exe 580 schtasks.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2588 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2648 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2648 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2648 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2648 2764 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2192 2376 taskeng.exe 34 PID 2376 wrote to memory of 2192 2376 taskeng.exe 34 PID 2376 wrote to memory of 2192 2376 taskeng.exe 34 PID 2376 wrote to memory of 2192 2376 taskeng.exe 34 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1704 2192 ntoskrnl.exe 35 PID 2192 wrote to memory of 1048 2192 ntoskrnl.exe 36 PID 2192 wrote to memory of 1048 2192 ntoskrnl.exe 36 PID 2192 wrote to memory of 1048 2192 ntoskrnl.exe 36 PID 2192 wrote to memory of 1048 2192 ntoskrnl.exe 36 PID 2376 wrote to memory of 1328 2376 taskeng.exe 38 PID 2376 wrote to memory of 1328 2376 taskeng.exe 38 PID 2376 wrote to memory of 1328 2376 taskeng.exe 38 PID 2376 wrote to memory of 1328 2376 taskeng.exe 38 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 1688 1328 ntoskrnl.exe 39 PID 1328 wrote to memory of 580 1328 ntoskrnl.exe 40 PID 1328 wrote to memory of 580 1328 ntoskrnl.exe 40 PID 1328 wrote to memory of 580 1328 ntoskrnl.exe 40 PID 1328 wrote to memory of 580 1328 ntoskrnl.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ABA938F9-8B0F-487B-87C4-85AAF9FF5A27} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exeC:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"3⤵
- Executes dropped EXE
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1048
-
-
-
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exeC:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"3⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53e9467442e5d328b1e6e4f23672e5f5b
SHA1c38c50d58063658b3d428e9e8dd9c501416d98cf
SHA256918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
SHA51229d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97