Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 11:29
Behavioral task
behavioral1
Sample
9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe
-
Size
106KB
-
MD5
9a82300a81123e77f96efd3c004a52f7
-
SHA1
7ef45fab09997b6231951b7eabaa10dae17d4a1f
-
SHA256
2b94ee21f6ee9dc5885d14a73243cc947a3d38d07e36af1e7094d8f3d9898001
-
SHA512
03599c974ada9d14bf463b1a44efb6015ba3d6d7ec05d8c6f168c705f4c63ad83b75f63c32da3d7b90cb380f59bc6c2ffd05b3eac640f5083d7ba00cc91d8666
-
SSDEEP
3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aYGRX:Ro2ViztvWlvd2UuIAQvQ+yFGR
Malware Config
Extracted
netwire
doc3.mooo.com:3636
doc4.ddns.net:3636
doc5.duckdns.org:3636
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
GAUUUU
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
teamoluwa
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x0036000000014574-2.dat netwire behavioral1/memory/1680-9-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1492-10-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1492-17-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1492-19-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1492-21-0x0000000000400000-0x0000000000425000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 1492 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1492 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe 28 PID 1680 wrote to memory of 1492 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe 28 PID 1680 wrote to memory of 1492 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe 28 PID 1680 wrote to memory of 1492 1680 9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a82300a81123e77f96efd3c004a52f7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Executes dropped EXE
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD59a82300a81123e77f96efd3c004a52f7
SHA17ef45fab09997b6231951b7eabaa10dae17d4a1f
SHA2562b94ee21f6ee9dc5885d14a73243cc947a3d38d07e36af1e7094d8f3d9898001
SHA51203599c974ada9d14bf463b1a44efb6015ba3d6d7ec05d8c6f168c705f4c63ad83b75f63c32da3d7b90cb380f59bc6c2ffd05b3eac640f5083d7ba00cc91d8666