Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe
-
Size
228KB
-
MD5
59b5865ebfc97a5f60613ec1215a0cac
-
SHA1
4b24442a00ed2954538164f5f0537f60adde0a0b
-
SHA256
a4a8cca75b62ca120cda2043d5cb7ea48bfba05da6bf9cd58f6af101151e0634
-
SHA512
74de4eb07b330247bda011b2e8a0104a21b90252a77db3e18e3813518d2ee31d4c1b962c4e8bbd4e65a9923c2197d9557c78e152a47d2fa8e526b831d87df6c2
-
SSDEEP
6144:FmvcIPl07bAHPcdS/mG4U9cozMsYbVW8M6F:FmvcIPl07bAHPcdymTBbV/M6F
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
extensions14718sec.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
YbcwLUQv
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2256-23-0x0000000000BF0000-0x0000000000C1C000-memory.dmp netwire behavioral1/memory/2216-38-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-34-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-32-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-30-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-40-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-42-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-43-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2216-50-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qIZRyx.url 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2256 set thread context of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1444 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 28 PID 2256 wrote to memory of 1444 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 28 PID 2256 wrote to memory of 1444 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 28 PID 2256 wrote to memory of 1444 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 28 PID 1444 wrote to memory of 2616 1444 csc.exe 30 PID 1444 wrote to memory of 2616 1444 csc.exe 30 PID 1444 wrote to memory of 2616 1444 csc.exe 30 PID 1444 wrote to memory of 2616 1444 csc.exe 30 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31 PID 2256 wrote to memory of 2216 2256 59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59b5865ebfc97a5f60613ec1215a0cac_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yvsgbz2o\yvsgbz2o.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES732.tmp" "c:\Users\Admin\AppData\Local\Temp\yvsgbz2o\CSC47856CD220584181901F476423411F9D.TMP"3⤵PID:2616
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d8d266c587a09794ee1da8ca88678aa0
SHA176e133ebf91a16dc714ef367279118214856ca7b
SHA256727acc2e7026cc3b690b0f88dbf2012bfb12022cf276c931419eea4a2ff495cc
SHA5121e168e8d4882a381ad42447b7d88360fdc81ba868ef4b94154301dc1863ee9af970019a7f9635b2e0076fc768c781e1926ed8b0abc01a27049c048c33e57d3a4
-
Filesize
13KB
MD57f3703f0cff2774d64a593753058bdc4
SHA1edd1a2bb769f9c12b570fe904a59d1d7154b3f64
SHA2564a0658e951468b8b9ab013f4e285dbe824c25c37af024a0cc07cb359290d3715
SHA512ff9925d30b02b6d7c15b2b861eb023f7a8ff7076df569c8f3d5385ce311fa76ceb97e7304cb9258d4d560e54aa67d883db9d479a87cbaf6d1adea33c28509bad
-
Filesize
39KB
MD5b957ebd75a12770c0977c489d8ecdbed
SHA1a4e0bcb08ab92ac7b671d0309bab8cfeeab2f110
SHA2560db39526b331bdefa2b1d705b0d74f7d5ec23908027b49f282c5ab93809beb9a
SHA5124eafe0966650213c8b3a3756705b59d1862e963f1dbf3a29f896b2f4cc06f215c38900eafa121a8c9e85e3c3fcbce04495ff1c923c0af0fbc7baac244253d4b1
-
Filesize
1KB
MD5846979a6dc23147caf13a264c74c8ae0
SHA1dac0206bfe326f09a09b12797f50eeb0b5966a45
SHA256a5196611b60e80e5d13b2c875757f08a659d23b48f17e7f62d88079ddb180349
SHA51264a86f2f8d452e8d0c9465bf9a51c37dba308bd7ae6ed25cfe920975bd954415798de52152517ffd92527e4cd2f8594a201a75605496b7a3eee3e436f4a6336b
-
Filesize
23KB
MD51f0fa9f72871b64abd914263debfee66
SHA184a520e95ce5db685cb9c99f6416b1552bd7ab85
SHA25607941407df2f3b23aeebbf700083235d8c50e8311a9fb77e5d196c09a466ad38
SHA512ee572879a2cb289430efa4ab9305a42ac612f9f6b9efeac8422c1bfd25616f3ee2545008fa8b163529d4194c44b66c0dd812957fbb38aa5cee1346f3d6260af9
-
Filesize
312B
MD530dcf0b325cb16825271b7827a590796
SHA1805f0065f2aead020bdbd1d2b3aa51d4fffec572
SHA25638382dbf6ec92053b7e4f3e1785bd4aa4bdb9cc2e9fd2c1638d40b0863e16682
SHA5124ad77abb7a273542ede4976d8fee9a7726a758b0b1207b541b93bbc1464675510ee006bb67f25db1a46f2009112d4cb9d5ec3eda4ce5eba54fc3e302dd79ef90