Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe
-
Size
324KB
-
MD5
50a652b21941da40d9fca80d12bd35f8
-
SHA1
b7cf2f941503dcb9167e9fcaf8a159c741161fbd
-
SHA256
666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c
-
SHA512
6ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e
-
SSDEEP
6144:8Pb+JB1nuNURlRBOipj5W01NSVsJipfBDNcjat9w44ml5:pYMjF+V7hBDm+934Y
Malware Config
Extracted
netwire
88.150.189.103:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3872-22-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/3872-25-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/3872-26-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/3872-31-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tesst.z4celhme.lnk 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2228 tesst.exe 3872 tesst.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 3872 2228 tesst.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 tesst.exe 2228 tesst.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe Token: SeDebugPrivilege 2228 tesst.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2228 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe 89 PID 4388 wrote to memory of 2228 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe 89 PID 4388 wrote to memory of 2228 4388 50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe 89 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93 PID 2228 wrote to memory of 3872 2228 tesst.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Roaming\tesst.exe"C:\Users\Admin\AppData\Roaming\tesst.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\tesst.exe"C:\Users\Admin\AppData\Roaming\tesst.exe"3⤵
- Executes dropped EXE
PID:3872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD550a652b21941da40d9fca80d12bd35f8
SHA1b7cf2f941503dcb9167e9fcaf8a159c741161fbd
SHA256666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c
SHA5126ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e