Analysis
-
max time kernel
127s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe
-
Size
969KB
-
MD5
56040e712b0675ac1245c413df7f5d0a
-
SHA1
5c88c9b659dc74acf52852bfd8e0631cbcc7287b
-
SHA256
c0b3e912fe8d995b240a82620ca43d053bd206ca9d5efba2872cae701bf9666d
-
SHA512
9f651c083445738e7a805e48dddcad295c7043b1f8f9e158cd471b2d96168935499172c4fda49a37a34309a0414cc23d54f84b926cb24fd7c8b74b5468ba68ab
-
SSDEEP
12288:IFmcpJBj6jRPLjRPqjBjjyjBjBjBjBjLjO/iH2T4tJk9mL8adZOXGeSAHgP8QHVI:I/o2ktK9i8adzAy8QVf5
Malware Config
Extracted
netwire
194.5.97.92:3363
194.5.97.92:3365
194.5.97.92:3368
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
turkey2021
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2792-31-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-33-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-34-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-25-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-23-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-22-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2792-36-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2864 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2864 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 32 PID 2724 wrote to memory of 2864 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 32 PID 2724 wrote to memory of 2864 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 32 PID 2724 wrote to memory of 2864 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 32 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34 PID 2724 wrote to memory of 2792 2724 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AyRaOzcHB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp120A.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD560f9256daeb391470c4b61cee93711f9
SHA1027bd7e9409f9098726d46315b5b7fb335432c40
SHA25672f2e683054af36061c598c779ae721ead25056815ac46c20be20a612307ebd1
SHA5127569b9694cc208a865281b27d74abc2d4f0cc66c3a5b4ade4c28347ffc1e620b46add4afa32b47e1ba20d892883d0f7db485658da42a520eb2c17bb8b9667823