Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:10
Behavioral task
behavioral1
Sample
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
-
Size
153KB
-
MD5
bf6b288e4f3d81eeead813d2250c08fe
-
SHA1
066c5b016c3476a0b1b3a59ccb26138b8c729bcb
-
SHA256
1aa8c68b8c4b4b5dc1d74307cfdc4bdd4191918b0c37bfc2e713d699711a3405
-
SHA512
dc79176dca34840e6ee02c8003f8bcccd127d18547981908d09f1a60570667383da577ed484c9b74fff4e3a7d25ebe50de28bebeb190ddeb67cbcf66528f3fad
-
SSDEEP
3072:/2bUV9DOMhb0pwHRLGv/xYFS9zIgn2t6eQi+:lxeiGHxb5ir+
Malware Config
Extracted
netwire
xn--49j.co:80
xn--49j.co:10100
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
Pentest-%Rand%
-
install_path
%AppData%\mDNSResolver.exe
-
keylogger_dir
%AppData%\mDNSResolver\cache\
-
lock_executable
true
-
mutex
PvvEwVMi
-
offline_keylogger
true
-
password
qDrI7K0gKf
-
registry_autorun
true
-
startup_name
mDNSResolver
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x000d00000001224d-2.dat netwire behavioral1/memory/2776-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2676-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2676-16-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2676 mDNSResolver.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 2776 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\mDNSResolver = "C:\\Users\\Admin\\AppData\\Roaming\\mDNSResolver.exe" mDNSResolver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2676 2776 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2676 2776 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2676 2776 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\mDNSResolver.exe"C:\Users\Admin\AppData\Roaming\mDNSResolver.exe" -m "C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5bf6b288e4f3d81eeead813d2250c08fe
SHA1066c5b016c3476a0b1b3a59ccb26138b8c729bcb
SHA2561aa8c68b8c4b4b5dc1d74307cfdc4bdd4191918b0c37bfc2e713d699711a3405
SHA512dc79176dca34840e6ee02c8003f8bcccd127d18547981908d09f1a60570667383da577ed484c9b74fff4e3a7d25ebe50de28bebeb190ddeb67cbcf66528f3fad