Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29/07/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe
-
Size
338KB
-
MD5
5ddc4cf0dad4b869b441a26e67444b73
-
SHA1
5cba29927759776c9f1a7b10d5fec27c863035e3
-
SHA256
839a5b4bc0c1e8d395e5b179a9e09dcbe9fb11d303595a1ade543c9873601312
-
SHA512
cad6d15988b8b3c1921e6eab951812c4ed74f2956cdfaf666ccff9b35ddb34ed5d79fad9c49bfbaef09f87296861bedbc0f57be4f2d2a13937998c0b8a81f232
-
SSDEEP
6144:DrMD6jcT15zUAVp4AE33eBQ4suHaxZ29eBRdN:3UgcTn5Vp4AxlQjBj
Malware Config
Extracted
netwire
dps5000.duckdns.org:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Filefox\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/712-31-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GoogleInc.lnk 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\GoogleInc.lnk 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 712 help.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 368 wrote to memory of 712 368 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe 91 PID 368 wrote to memory of 712 368 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe 91 PID 368 wrote to memory of 712 368 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe 91 PID 368 wrote to memory of 712 368 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe 91 PID 368 wrote to memory of 712 368 5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\help.exe"C:\Users\Admin\AppData\Local\Temp\5ddc4cf0dad4b869b441a26e67444b73_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD537870dde351d805bc433b1555b7b47bd
SHA10fcf39409c8225be53faf670b467c278e39ad527
SHA2560c88e2c1346be5aad30333b653f39f33fced5271c703b2c284d0a55e17d7bc97
SHA512626f34d45594b5c26293789ea23295c879e7f7620ddad5b323b86cd19bf4b7998a8e8c926126c5489f5d1b92fc08db07ec770c4ffc516b37d694f5d41ef9e9f6
-
Filesize
1016B
MD51a3ed671cee916f75bacd5ead5446619
SHA101f86a552db3f2df58ff6c3721cb231e1a38264e
SHA256a056fafd7bed6c91d49bd4145af5d33124c0fd07a1a47da4c80b0f21cdf28406
SHA5123a7841327a17a5b034269dde80c65c44b3f95b7a91e2d227808244084baff2434227d081cb28e96400502e17c71c715254d1ea17205e9642bb59f623672924f7
-
Filesize
143KB
MD564586fb2a58c222a19473417f382d45a
SHA1dff07ec732118e6efb55d7cfad647dd33ac49d6c
SHA2568ae437e28813d4d2e3c8551b22de36385133db8b3c9f68ddcc226f09b1e328d0
SHA512abcd80e1c357d2e302be5e048d0e4b344de560d57c25084d754574e79d7ed391bf6db3f8bd640bf9abca75ec8849d3ccce490f4b03d6b12b39a2f111e1e3a67d