Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:39
Behavioral task
behavioral1
Sample
6905d494933c6801d7806321c2b1b433_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
6905d494933c6801d7806321c2b1b433_JaffaCakes118.exe
-
Size
131KB
-
MD5
6905d494933c6801d7806321c2b1b433
-
SHA1
dd49283de4db651c80f1e663c9180b2046f9b13a
-
SHA256
0deab4a3ba12373bc46dc614d7481d68a2704f540eae3b02c4273831cd2574c1
-
SHA512
cb3693905824b6f4e056f8c519804429391303ecb58a94796bc8476a966d932b6e508393f7a14df85590d8a5c19406d4066853294b1f49704e12514505f77dfe
-
SSDEEP
3072:YOzIy5XGViztldWl88Yed2DQuIAQvQ+d0aYyoSjX:Yo2ViztvWlvd2UuIAQvQ+yFfSj
Malware Config
Extracted
Family
netwire
C2
kydess.ddns.net:3468
Attributes
-
activex_autorun
true
-
activex_key
{84GX3HQ7-6WX5-Q68R-X23R-8I7148Q8T4KH}
-
copy_executable
true
-
delete_original
false
-
host_id
kydess.ddns.net
-
install_path
%AppData%\Install\Host20.exe
-
keylogger_dir
C:\Users\donovan\AppData\Roaming\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3956-0-0x0000000000400000-0x0000000000424DEC-memory.dmp netwire -
Program crash 1 IoCs
pid pid_target Process procid_target 956 3956 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6905d494933c6801d7806321c2b1b433_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6905d494933c6801d7806321c2b1b433_JaffaCakes118.exe"1⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 3922⤵
- Program crash
PID:956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3956 -ip 39561⤵PID:980