Analysis
-
max time kernel
60s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe
-
Size
480KB
-
MD5
c6d687a93a119f80b232d0a5430be96c
-
SHA1
dd3f1bf68e89370150e258793d0da4f1decda5c2
-
SHA256
1b258545e9107c34a16fdd668427521cf639f430fcad337c8c709f779a031a5e
-
SHA512
c283961aa63a13031234ea2ef7fcc69287e5ca831945dd1d38b2d8e6e8195b5ef0825dfbc59d9ac4cff4e2d75c789e0fedb36b13158499cf7f441fdb433dbbbc
-
SSDEEP
12288:N26YCaL0/TbBktszrqSldEXkNHhyOxSoIo/jnBA:g6naABk+qSsXkNHYuxhbB
Malware Config
Extracted
netwire
79.134.225.58:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
79.134.225.58
-
lock_executable
false
-
offline_keylogger
false
-
password
Password2019@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2272-25-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2272-21-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2272-17-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2272-19-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2272-27-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2272 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2812 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2812 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2812 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2812 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2812 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 29 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2272 2432 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2604 2272 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2604 2272 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2604 2272 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2604 2272 c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UczgzqmHY" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD652.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6d687a93a119f80b232d0a5430be96c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 1403⤵
- Program crash
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54d11f3ae04cdc7af5d3b602171cafaf7
SHA1c41a789acd07fec9435be98fa0a33011b04fbaf0
SHA2566dfac711b8d38673b0bd5924f108cf8fc0eab20b26b0729ad59addc943233350
SHA5126ee8b489adc32b14cf253280a8cba133185fa2fb6fcdb5db499e88ad3f2fa067f7f775276ba0caddcaa7914065246c73c91c3035ac347975df2bbdefde01205f