Analysis
-
max time kernel
79s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe
-
Size
562KB
-
MD5
bdd639e15d8c88efe5ab1f58608a0302
-
SHA1
fd99f0cff3ebbc6254c86147096148b41aa31b5f
-
SHA256
5283ee93c25e567f42c1dd8743e1121a6973f922d1ef6e9286b3d40e27f357b5
-
SHA512
880f7f2401a470c4c157659cec8b3f396233b260a1cc68d698cb0443e88bef56ddf2435e100a1c780956b5cbe5c22906024ef4a90245d1615ebf28fd67efdd85
-
SSDEEP
12288:V8FaD+mjs28sVj4tOSlI3XopCZET0Ri+esTCmmZ:QaD+mgGj4tlQX1Zq0x2my
Malware Config
Extracted
netwire
127.0.0.1:3360
elumadns.eluma101.com:4003
elumadns.eluma101.com:4000
jmoney.daniel2you.com:4000
jmoney.daniel2you.com:4003
oluwa101.hopto.org:4003
oluwa101.hopto.org:4000
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
NEWEST_2019
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
BEBSWoHf
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1468-35-0x0000000000400000-0x000000000042D000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2608 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ms OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Macromedia\\StikyNot.exe" bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4720 set thread context of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 PID 4720 wrote to memory of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 PID 4720 wrote to memory of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 PID 4720 wrote to memory of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 PID 4720 wrote to memory of 1468 4720 bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe 109 PID 1468 wrote to memory of 2608 1468 mstsc.exe 110 PID 1468 wrote to memory of 2608 1468 mstsc.exe 110 PID 1468 wrote to memory of 2608 1468 mstsc.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdd639e15d8c88efe5ab1f58608a0302_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\System32\mstsc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59381487fc539c364449fba525e05dd52
SHA1ef6c688bc2aee22ebc5cb95d014e044a9ea8605f
SHA2566d0f73a4fbf12fee6fe20a5b02cc23874a75977726e5b8605000321f3e686622
SHA512348f87928c18eb6a79898a47a9511f7c24490eac80a4644f2b1aeb52ce4c0b82fbdd60455c01bd12fcbe20dae16499e1b20a3cced4049f81002338b0b1e3f631