Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:10
Behavioral task
behavioral1
Sample
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe
-
Size
153KB
-
MD5
bf6b288e4f3d81eeead813d2250c08fe
-
SHA1
066c5b016c3476a0b1b3a59ccb26138b8c729bcb
-
SHA256
1aa8c68b8c4b4b5dc1d74307cfdc4bdd4191918b0c37bfc2e713d699711a3405
-
SHA512
dc79176dca34840e6ee02c8003f8bcccd127d18547981908d09f1a60570667383da577ed484c9b74fff4e3a7d25ebe50de28bebeb190ddeb67cbcf66528f3fad
-
SSDEEP
3072:/2bUV9DOMhb0pwHRLGv/xYFS9zIgn2t6eQi+:lxeiGHxb5ir+
Malware Config
Extracted
netwire
xn--49j.co:80
xn--49j.co:10100
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
Pentest-%Rand%
-
install_path
%AppData%\mDNSResolver.exe
-
keylogger_dir
%AppData%\mDNSResolver\cache\
-
lock_executable
true
-
mutex
PvvEwVMi
-
offline_keylogger
true
-
password
qDrI7K0gKf
-
registry_autorun
true
-
startup_name
mDNSResolver
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000900000002345b-4.dat netwire behavioral2/memory/1204-8-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/540-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/540-16-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 540 mDNSResolver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mDNSResolver = "C:\\Users\\Admin\\AppData\\Roaming\\mDNSResolver.exe" mDNSResolver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1204 wrote to memory of 540 1204 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 83 PID 1204 wrote to memory of 540 1204 bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\mDNSResolver.exe"C:\Users\Admin\AppData\Roaming\mDNSResolver.exe" -m "C:\Users\Admin\AppData\Local\Temp\bf6b288e4f3d81eeead813d2250c08fe_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5bf6b288e4f3d81eeead813d2250c08fe
SHA1066c5b016c3476a0b1b3a59ccb26138b8c729bcb
SHA2561aa8c68b8c4b4b5dc1d74307cfdc4bdd4191918b0c37bfc2e713d699711a3405
SHA512dc79176dca34840e6ee02c8003f8bcccd127d18547981908d09f1a60570667383da577ed484c9b74fff4e3a7d25ebe50de28bebeb190ddeb67cbcf66528f3fad