Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe
-
Size
685KB
-
MD5
4a345ff1d667f3fd5d76178149e97861
-
SHA1
1b0636c3d65c906bea35daccfe8b124faae02249
-
SHA256
593030d6a46702b5577e982f4c00c427766629211d85c88cbc4b5d17de639b7b
-
SHA512
d93f02548e2eb2cd0dc1a25a0a6e78f66b190b0dffa772f53ee1bd2c6725c41eaddb90a8e19bcfb1beff07b3b0c780904817f77f8802018440e7a132176f9fab
-
SSDEEP
12288:AVkUO8yIy581Qv8yIy581QfOjJ+AUdFG:aYn8m/n8m8Udw
Malware Config
Extracted
netwire
watsonly.ddns.net:1191
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\WiaLogs\
-
lock_executable
false
-
mutex
NCPblmjG
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Windows Defender
-
use_mutex
true
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2072-8-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2072-9-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2072-10-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2072-14-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2072-16-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2072-21-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2760-54-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2760-50-0x0000000000080000-0x00000000000AC000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2788 Host.exe 2760 Host.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1728-2-0x0000000000450000-0x0000000000478000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1728 set thread context of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 2788 set thread context of 2760 2788 Host.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe Token: SeDebugPrivilege 2788 Host.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2072 1728 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 28 PID 2072 wrote to memory of 2788 2072 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 29 PID 2072 wrote to memory of 2788 2072 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 29 PID 2072 wrote to memory of 2788 2072 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 29 PID 2072 wrote to memory of 2788 2072 4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe 29 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30 PID 2788 wrote to memory of 2760 2788 Host.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a345ff1d667f3fd5d76178149e97861_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD54a345ff1d667f3fd5d76178149e97861
SHA11b0636c3d65c906bea35daccfe8b124faae02249
SHA256593030d6a46702b5577e982f4c00c427766629211d85c88cbc4b5d17de639b7b
SHA512d93f02548e2eb2cd0dc1a25a0a6e78f66b190b0dffa772f53ee1bd2c6725c41eaddb90a8e19bcfb1beff07b3b0c780904817f77f8802018440e7a132176f9fab