Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
1cd6e77a4650155c54c0dc02b7ac8830
-
SHA1
2806bda7ff96b1a020400e69fb74773baff36b0a
-
SHA256
7ba0b6ce1beabf5437752c8dbe851e1af8bbc74154c1ce318cd4241acf4c763f
-
SHA512
28dd6bde9cd2d6ce063b7142b1b9bf0f5bcb34c702882c7c167e985863c5b1720c4eba25e92b12ee34c00f3651edae355a64b1681b51a9e3bbc325c04907af14
-
SSDEEP
24576:uAHnh+eWsN3skA4RV1Hom2KXMmHaJnhlHsMkyigucCg/fFq1t5:Zh+ZkldoPK8YahhlHsMksunyfsR
Malware Config
Extracted
netwire
79.134.225.35:8687
-
activex_autorun
true
-
activex_key
{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
windows
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/316-4-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/316-15-0x0000000000080000-0x00000000000AC000-memory.dmp netwire behavioral1/memory/2760-37-0x0000000000080000-0x00000000000AC000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TK1A7HT7-DQYO-67A2-ANU2-MW11C1A1UU6E}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Executes dropped EXE 2 IoCs
pid Process 2516 Host.exe 2760 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 316 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2516 Host.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\tbacjqhpmshonqemdpvu = "C:\\Users\\Public\\tbacjqhpmshonqemdpvu.vbs" 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\tbacjqhpmshonqemdpvu = "C:\\Users\\Public\\tbacjqhpmshonqemdpvu.vbs" Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000014400-17.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2948 set thread context of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2516 set thread context of 2760 2516 Host.exe 30 -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2516 Host.exe 2516 Host.exe 2516 Host.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 2516 Host.exe 2516 Host.exe 2516 Host.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 2948 wrote to memory of 316 2948 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 28 PID 316 wrote to memory of 2516 316 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 29 PID 316 wrote to memory of 2516 316 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 29 PID 316 wrote to memory of 2516 316 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 29 PID 316 wrote to memory of 2516 316 1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe 29 PID 2516 wrote to memory of 2760 2516 Host.exe 30 PID 2516 wrote to memory of 2760 2516 Host.exe 30 PID 2516 wrote to memory of 2760 2516 Host.exe 30 PID 2516 wrote to memory of 2760 2516 Host.exe 30 PID 2516 wrote to memory of 2760 2516 Host.exe 30 PID 2516 wrote to memory of 2760 2516 Host.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1cd6e77a4650155c54c0dc02b7ac8830_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:2760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51cd6e77a4650155c54c0dc02b7ac8830
SHA12806bda7ff96b1a020400e69fb74773baff36b0a
SHA2567ba0b6ce1beabf5437752c8dbe851e1af8bbc74154c1ce318cd4241acf4c763f
SHA51228dd6bde9cd2d6ce063b7142b1b9bf0f5bcb34c702882c7c167e985863c5b1720c4eba25e92b12ee34c00f3651edae355a64b1681b51a9e3bbc325c04907af14