Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe
-
Size
969KB
-
MD5
56040e712b0675ac1245c413df7f5d0a
-
SHA1
5c88c9b659dc74acf52852bfd8e0631cbcc7287b
-
SHA256
c0b3e912fe8d995b240a82620ca43d053bd206ca9d5efba2872cae701bf9666d
-
SHA512
9f651c083445738e7a805e48dddcad295c7043b1f8f9e158cd471b2d96168935499172c4fda49a37a34309a0414cc23d54f84b926cb24fd7c8b74b5468ba68ab
-
SSDEEP
12288:IFmcpJBj6jRPLjRPqjBjjyjBjBjBjBjLjO/iH2T4tJk9mL8adZOXGeSAHgP8QHVI:I/o2ktK9i8adzAy8QVf5
Malware Config
Extracted
netwire
194.5.97.92:3363
194.5.97.92:3365
194.5.97.92:3368
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
turkey2021
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/5040-21-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5040-24-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5040-25-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5040-27-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3292 set thread context of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1956 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 105 PID 3292 wrote to memory of 1956 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 105 PID 3292 wrote to memory of 1956 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 105 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107 PID 3292 wrote to memory of 5040 3292 56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AyRaOzcHB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp42AC.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56040e712b0675ac1245c413df7f5d0a_JaffaCakes118.exe"2⤵PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b03f58456adfd15c98ffcf3f30fa2762
SHA1cf24a3b4f9e01a3285aa567c436a98987e120d9d
SHA256adedbbb2eba47d7b4c4c009c1ed5ba23f448c81f62d1338fdb10c30f42247b94
SHA512a5b0d3e76b3444ad47187b6f5695117d65edd0147d430e9878a7716f88818ff71fb6cfae50886dcdbab286da889d99402971645719df9e6683a7f265466dd952