Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe
-
Size
428KB
-
MD5
69935bc27fe70192f8d8978057e66aff
-
SHA1
39ef96e0781b4a4d54c4c6ce55aabbd9b4cfb3de
-
SHA256
a754ba970ae05659445f39a3c858ed52f8fa6d3dee37b58f480f5d481a9b8131
-
SHA512
9cd2f70a74cbf1e7aa4c65f2eac23934b75799ce3cb0d39decae806624a1c4fdd8d43a3711ae72c6be784baeb02a42bcc84903ced84062cf288b5a800e92b17d
-
SSDEEP
12288:huWszgGH5W28mmhNQz+GYULCogYAX1uXO2:hozgGZoBogYAMp
Malware Config
Extracted
netwire
glotin.zapto.org:4722
-
activex_autorun
true
-
activex_key
{2T04X7P3-16C4-8520-6G14-244YTD2A2040}
-
copy_executable
true
-
delete_original
false
-
host_id
MONEY1
-
install_path
%AppData%\Install\excel.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
pigWTCXD
-
offline_keylogger
true
-
password
Hunter45
-
registry_autorun
true
-
startup_name
Microsoft
-
use_mutex
true
Signatures
-
NetWire RAT payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/2520-29-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-38-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-50-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2520-42-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-40-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-35-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-33-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2520-31-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/1636-86-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/1636-92-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
excel.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2T04X7P3-16C4-8520-6G14-244YTD2A2040} excel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2T04X7P3-16C4-8520-6G14-244YTD2A2040}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\excel.exe\"" excel.exe -
Drops startup file 2 IoCs
Processes:
cmd.execmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
1.xyz1.xyzexcel.exeexcel.exepid process 2220 1.xyz 2520 1.xyz 2436 excel.exe 1636 excel.exe -
Loads dropped DLL 8 IoCs
Processes:
69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe1.xyz1.xyzexcel.exeexcel.exepid process 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 2220 1.xyz 2520 1.xyz 2520 1.xyz 2436 excel.exe 2436 excel.exe 1636 excel.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz upx behavioral1/memory/2220-90-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral1/memory/2436-91-0x0000000000400000-0x0000000001400000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exeexcel.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\excel.exe" excel.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1.xyzexcel.exedescription pid process target process PID 2220 set thread context of 2520 2220 1.xyz 1.xyz PID 2436 set thread context of 1636 2436 excel.exe excel.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1.xyzexcel.exepid process 2220 1.xyz 2220 1.xyz 2436 excel.exe 2436 excel.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1.xyzexcel.exepid process 2220 1.xyz 2220 1.xyz 2436 excel.exe 2436 excel.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe1.xyz1.xyzcmd.exenet.exeexcel.exedescription pid process target process PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2160 wrote to memory of 2220 2160 69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe 1.xyz PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2632 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2744 2220 1.xyz cmd.exe PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2220 wrote to memory of 2520 2220 1.xyz 1.xyz PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2520 wrote to memory of 2436 2520 1.xyz excel.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2744 wrote to memory of 2180 2744 cmd.exe net.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2180 wrote to memory of 2468 2180 net.exe net1.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe PID 2436 wrote to memory of 2440 2436 excel.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69935bc27fe70192f8d8978057e66aff_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵PID:2468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\Install\excel.exe"C:\Users\Admin\AppData\Roaming\Install\excel.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\excel.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:2440
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc5⤵PID:2368
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc6⤵PID:2276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc7⤵PID:2724
-
-
-
-
C:\Users\Admin\AppData\Roaming\Install\excel.exe"C:\Users\Admin\AppData\Roaming\Install\excel.exe"5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5343d2db443348e4e0323c33cf1b47ae8
SHA112b85889c41523f3256c5e4ad370d494d65140af
SHA2560e5a2b6351cfdc01ed7ca253e0fe575e5472462d88fea57bf363affede23e478
SHA5120e49f09a8f0988204df4f4d1732df87ac4ae9ba4132aa50c2962238ea2ba69743e3033aed3b2edaf86a67359c57899217d9525f6b49624d5d4e35b70ff1f9c19
-
Filesize
111B
MD589394958ce9d184d2340451aad75fffd
SHA157984720d59beb2d034483c409f7791dd6a41cc8
SHA2562f1e20eab24d144fe57631b11a5b6cef3d805f9a368b008ed38e7bd8d15e43bf
SHA51284a9e31e6d2a516d49c2bb12a004fb79fd4c822aa402556b8fc84180d779d2c4040a14c47b5ef9f604da51064d9f66c41e161bc415b9134212e2dd000140aba4
-
Filesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932