Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe
-
Size
10.2MB
-
MD5
a37a802f3cb72830c06c3eae532fe402
-
SHA1
cb08cf20440e0326e9336e25353481cb4689b420
-
SHA256
5eeab5d3d9d56bf0fc46b37c47cab9e2c60b6052df49ead55aa555cb63ad66ac
-
SHA512
dc2649adce477126785b4268d7a3b6e7cfb92d5fbf6f7b36c76593f536b7b672b60bf39e26b203f1a193570e2ce60e623e0612a7a63756ada247c96f96c9e0a6
-
SSDEEP
98304:W1DsMqv8YwRfS5fqDADzBBQ/ldfii/o7/iAXflijzJk/d3tz:wDXJYwRf+CyBB8tSXf66d3tz
Malware Config
Extracted
netwire
reroutetraffic.io:4548
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
bprn2x
-
keylogger_dir
%AppData%\SanderApp\
-
lock_executable
false
-
offline_keylogger
true
-
password
iT5HZYc8pnFOlw3JAF8gfKBQcUZrrOyZ
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/572-7-0x0000000005C50000-0x0000000005C8F000-memory.dmp netwire behavioral2/memory/4428-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\AdobeSchs.job cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 572 notepad.exe 572 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 572 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93 PID 2980 wrote to memory of 572 2980 a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a37a802f3cb72830c06c3eae532fe402_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4428
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3884,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:1104