General
-
Target
acb2840b575bd538efdd76ada3a603a2_JaffaCakes118
-
Size
1022KB
-
Sample
240615-dmrxmsxdjf
-
MD5
acb2840b575bd538efdd76ada3a603a2
-
SHA1
e871d22c8443eb556e897d18d77e6e8ead667cce
-
SHA256
c8f71c7078e8667e79d827762ad65bcbc311195da00e87df782a30424e6f93af
-
SHA512
e938e85070bc9e30cb3a9690c35dea55da4389cb30621c163f35170570ee6a245f2b2b1376bcdfaf3e070b83a9cb3cd72cc5639e19bd12247903abd547109a75
-
SSDEEP
1536:4Wp4doeVY9nzccb43+o/20t5Yrpq/nvR803E58XK5MhGJ/fYWCJzw8YeEvi7gaF3:rGoxzA3+o/20t5YIvHuImoP0vtuF4q
Static task
static1
Behavioral task
behavioral1
Sample
acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
netwire
91.192.100.3:1199
-
activex_autorun
true
-
activex_key
{0841AJ8U-8PI0-YXLN-18O6-2786QVLQ43VL}
-
copy_executable
true
-
delete_original
false
-
host_id
Bushbush
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
QKiFRiUe
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Avast
-
use_mutex
true
Extracted
njrat
0.7d
HacKed
91.192.100.3:1406
b6d8b4f8ec6a24a915c0dbdb3f24d168
-
reg_key
b6d8b4f8ec6a24a915c0dbdb3f24d168
-
splitter
|'|'|
Targets
-
-
Target
acb2840b575bd538efdd76ada3a603a2_JaffaCakes118
-
Size
1022KB
-
MD5
acb2840b575bd538efdd76ada3a603a2
-
SHA1
e871d22c8443eb556e897d18d77e6e8ead667cce
-
SHA256
c8f71c7078e8667e79d827762ad65bcbc311195da00e87df782a30424e6f93af
-
SHA512
e938e85070bc9e30cb3a9690c35dea55da4389cb30621c163f35170570ee6a245f2b2b1376bcdfaf3e070b83a9cb3cd72cc5639e19bd12247903abd547109a75
-
SSDEEP
1536:4Wp4doeVY9nzccb43+o/20t5Yrpq/nvR803E58XK5MhGJ/fYWCJzw8YeEvi7gaF3:rGoxzA3+o/20t5YIvHuImoP0vtuF4q
-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1