Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
3e9467442e5d328b1e6e4f23672e5f5b
-
SHA1
c38c50d58063658b3d428e9e8dd9c501416d98cf
-
SHA256
918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
-
SHA512
29d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97
-
SSDEEP
24576:hu6J33O0c+JY5UZ+XC0kGso6FaQTwzhnpAWY:zu0c++OCvkGs9FahPY
Malware Config
Extracted
netwire
77.48.28.195:1969
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
n2
-
lock_executable
false
-
mutex
JquNADho
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3268-0-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3268-10-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ntoskrnl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ntoskrnl.exe -
Executes dropped EXE 4 IoCs
pid Process 3540 ntoskrnl.exe 3512 ntoskrnl.exe 4476 ntoskrnl.exe 1088 ntoskrnl.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00090000000233ae-12.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4680 set thread context of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 3540 set thread context of 3512 3540 ntoskrnl.exe 94 PID 4476 set thread context of 1088 4476 ntoskrnl.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe 468 schtasks.exe 4496 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 4680 wrote to memory of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 4680 wrote to memory of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 4680 wrote to memory of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 4680 wrote to memory of 3268 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 89 PID 4680 wrote to memory of 3532 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 90 PID 4680 wrote to memory of 3532 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 90 PID 4680 wrote to memory of 3532 4680 3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe 90 PID 3540 wrote to memory of 3512 3540 ntoskrnl.exe 94 PID 3540 wrote to memory of 3512 3540 ntoskrnl.exe 94 PID 3540 wrote to memory of 3512 3540 ntoskrnl.exe 94 PID 3540 wrote to memory of 3512 3540 ntoskrnl.exe 94 PID 3540 wrote to memory of 3512 3540 ntoskrnl.exe 94 PID 3540 wrote to memory of 468 3540 ntoskrnl.exe 95 PID 3540 wrote to memory of 468 3540 ntoskrnl.exe 95 PID 3540 wrote to memory of 468 3540 ntoskrnl.exe 95 PID 4476 wrote to memory of 1088 4476 ntoskrnl.exe 98 PID 4476 wrote to memory of 1088 4476 ntoskrnl.exe 98 PID 4476 wrote to memory of 1088 4476 ntoskrnl.exe 98 PID 4476 wrote to memory of 1088 4476 ntoskrnl.exe 98 PID 4476 wrote to memory of 1088 4476 ntoskrnl.exe 98 PID 4476 wrote to memory of 4496 4476 ntoskrnl.exe 99 PID 4476 wrote to memory of 4496 4476 ntoskrnl.exe 99 PID 4476 wrote to memory of 4496 4476 ntoskrnl.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe"2⤵PID:3268
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3532
-
-
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exeC:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"2⤵
- Executes dropped EXE
PID:3512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:468
-
-
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exeC:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe"2⤵
- Executes dropped EXE
PID:1088
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn DPTopologyAppv2_0 /tr "C:\Users\Admin\AppData\Roaming\diskperf\ntoskrnl.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53e9467442e5d328b1e6e4f23672e5f5b
SHA1c38c50d58063658b3d428e9e8dd9c501416d98cf
SHA256918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
SHA51229d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97