General
-
Target
636fe98bde392f519b60e46f80dbbda5_JaffaCakes118
-
Size
419KB
-
Sample
240521-qlqpeafd51
-
MD5
636fe98bde392f519b60e46f80dbbda5
-
SHA1
1d174d0235c74b87011d0ac4cb5097b533c41163
-
SHA256
8de3dda2e65faa4fffcac28429edb1dbd767edbfebf45314cba0269c3a4e6933
-
SHA512
1eaa2fb0d90a8e4119875904d26d0b50aa882f62bd149aefc0c8a3919f4e439e9dc0289105ea1497d6b619e7b60039557d8f8d46b424cb5fbb3f0b75562aa805
-
SSDEEP
12288:JFtRqnzyWrELTwWjhC7mQBN097mSOQcT:T+nzyWrEQ7mloSvcT
Static task
static1
Behavioral task
behavioral1
Sample
636fe98bde392f519b60e46f80dbbda5_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
netwire
sepp.myq-see.com:2001
-
activex_autorun
true
-
activex_key
{50L4QLIK-5N0E-1U7P-5W65-RDN0R6N72FF0}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
XdWObmml
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
636fe98bde392f519b60e46f80dbbda5_JaffaCakes118
-
Size
419KB
-
MD5
636fe98bde392f519b60e46f80dbbda5
-
SHA1
1d174d0235c74b87011d0ac4cb5097b533c41163
-
SHA256
8de3dda2e65faa4fffcac28429edb1dbd767edbfebf45314cba0269c3a4e6933
-
SHA512
1eaa2fb0d90a8e4119875904d26d0b50aa882f62bd149aefc0c8a3919f4e439e9dc0289105ea1497d6b619e7b60039557d8f8d46b424cb5fbb3f0b75562aa805
-
SSDEEP
12288:JFtRqnzyWrELTwWjhC7mQBN097mSOQcT:T+nzyWrEQ7mloSvcT
-
NetWire RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Modifies Installed Components in the registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1