Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe
-
Size
1022KB
-
MD5
acb2840b575bd538efdd76ada3a603a2
-
SHA1
e871d22c8443eb556e897d18d77e6e8ead667cce
-
SHA256
c8f71c7078e8667e79d827762ad65bcbc311195da00e87df782a30424e6f93af
-
SHA512
e938e85070bc9e30cb3a9690c35dea55da4389cb30621c163f35170570ee6a245f2b2b1376bcdfaf3e070b83a9cb3cd72cc5639e19bd12247903abd547109a75
-
SSDEEP
1536:4Wp4doeVY9nzccb43+o/20t5Yrpq/nvR803E58XK5MhGJ/fYWCJzw8YeEvi7gaF3:rGoxzA3+o/20t5YIvHuImoP0vtuF4q
Malware Config
Extracted
netwire
91.192.100.3:1199
-
activex_autorun
true
-
activex_key
{0841AJ8U-8PI0-YXLN-18O6-2786QVLQ43VL}
-
copy_executable
true
-
delete_original
false
-
host_id
Bushbush
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
QKiFRiUe
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Avast
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x00080000000233e8-15.dat netwire behavioral2/memory/1760-28-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/2708-33-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0841AJ8U-8PI0-YXLN-18O6-2786QVLQ43VL}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0841AJ8U-8PI0-YXLN-18O6-2786QVLQ43VL} Host.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1820 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\filename.exe acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\filename.exe acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1760 Host.exe 1768 Server.exe 2708 Host.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Avast = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b6d8b4f8ec6a24a915c0dbdb3f24d168 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\b6d8b4f8ec6a24a915c0dbdb3f24d168 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4004 set thread context of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe Token: 33 1768 Server.exe Token: SeIncBasePriorityPrivilege 1768 Server.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 4004 wrote to memory of 1536 4004 acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe 81 PID 1536 wrote to memory of 1760 1536 RegAsm.exe 82 PID 1536 wrote to memory of 1760 1536 RegAsm.exe 82 PID 1536 wrote to memory of 1760 1536 RegAsm.exe 82 PID 1536 wrote to memory of 1768 1536 RegAsm.exe 84 PID 1536 wrote to memory of 1768 1536 RegAsm.exe 84 PID 1536 wrote to memory of 1768 1536 RegAsm.exe 84 PID 1760 wrote to memory of 2708 1760 Host.exe 85 PID 1760 wrote to memory of 2708 1760 Host.exe 85 PID 1760 wrote to memory of 2708 1760 Host.exe 85 PID 1768 wrote to memory of 1820 1768 Server.exe 86 PID 1768 wrote to memory of 1820 1768 Server.exe 86 PID 1768 wrote to memory of 1820 1768 Server.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acb2840b575bd538efdd76ada3a603a2_JaffaCakes118.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5e6816a314a4cb6ab308e9b8066e61baa
SHA186baae6075ddf7c05bb67788c3e4844385f5b5cc
SHA256f6307bac4e2e5a5d006461bc0e614acb738c86cf0ea6a606c7c72fa72074e81e
SHA5121bae0eed5177de9c828bc3d40889afe0eba064d49bd4830aa0c9ed234b0baa521fd62d30499eed4c64f2aafcb8dfb055042b0b5c7c1e1b761d68428b6bf6c648
-
Filesize
23KB
MD5728611dc09fdcba13bbcca5247956cd0
SHA17ffa8dd6838120a4e5fa0b6af25e71dfe9a5778a
SHA256130281a00892bb6f5ed16c8c3ebf3b2a5105a475d914a3fa2c341586d427878b
SHA5123ea67e97a558836f8ce696d6b4f67c14f581df810f13415b6dabc6e26ba9d9a79a1c8e6048faf16da99c52d2c7e261a25c8513e448154968c6d705956dafeb81