Analysis
-
max time kernel
127s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe
-
Size
10.2MB
-
MD5
a37a802f3cb72830c06c3eae532fe402
-
SHA1
cb08cf20440e0326e9336e25353481cb4689b420
-
SHA256
5eeab5d3d9d56bf0fc46b37c47cab9e2c60b6052df49ead55aa555cb63ad66ac
-
SHA512
dc2649adce477126785b4268d7a3b6e7cfb92d5fbf6f7b36c76593f536b7b672b60bf39e26b203f1a193570e2ce60e623e0612a7a63756ada247c96f96c9e0a6
-
SSDEEP
98304:W1DsMqv8YwRfS5fqDADzBBQ/ldfii/o7/iAXflijzJk/d3tz:wDXJYwRf+CyBB8tSXf66d3tz
Malware Config
Extracted
netwire
reroutetraffic.io:4548
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
bprn2x
-
keylogger_dir
%AppData%\SanderApp\
-
lock_executable
false
-
offline_keylogger
true
-
password
iT5HZYc8pnFOlw3JAF8gfKBQcUZrrOyZ
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1732-6-0x00000000055B0000-0x00000000055EF000-memory.dmp netwire behavioral1/memory/2608-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2608-10-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2608-21-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\AdobeSchs.job cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 1732 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1732 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1732 2236 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31 PID 1732 wrote to memory of 2608 1732 notepad.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2608
-
-