Analysis
-
max time kernel
147s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe
-
Size
427KB
-
MD5
cdacadda6a7ecfb449310a3f92bbd6de
-
SHA1
ae7520c09469cce70d9495d9092c49f176dac67c
-
SHA256
709461e5e465b5b776ceb72a7fa69772cb97460ad5daf8dbe756e0614678d2e3
-
SHA512
9314a3e2b69f9bdd6f208e9d3e3647baa640d26e20ffa60db7ce1e027b0af4380a7b8a63b8b477119f5fb2596e218843bcf6387d75dd31eab64b637d3515711e
-
SSDEEP
6144:ojbei8D7JNEeHfZEW6GH5W288Lhvb5HEGa+00bivT0HdibcIAKZ0:ou7tzgGH5W28UvbeGrZOhcc0
Malware Config
Extracted
netwire
qualitytrade12.hopto.org:3194
-
activex_autorun
true
-
activex_key
{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V}
-
copy_executable
true
-
delete_original
false
-
host_id
NEWCLIENT
-
install_path
%AppData%\Install\word.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
IAqepjWi
-
offline_keylogger
true
-
password
master45
-
registry_autorun
true
-
startup_name
Mozila
-
use_mutex
true
Signatures
-
NetWire RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2852-50-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2852-42-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-40-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-38-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-35-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-33-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-31-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2852-29-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2320-86-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral1/memory/2320-92-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V} word.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\word.exe\"" word.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2344 1.xyz 2852 1.xyz 2996 word.exe 2320 word.exe -
Loads dropped DLL 8 IoCs
pid Process 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 2344 1.xyz 2852 1.xyz 2852 1.xyz 2996 word.exe 2996 word.exe 2320 word.exe -
resource yara_rule behavioral1/files/0x0009000000016ce3-4.dat upx behavioral1/memory/2344-90-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral1/memory/2996-91-0x0000000000400000-0x0000000001400000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mozila = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\word.exe" word.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2344 set thread context of 2852 2344 1.xyz 33 PID 2996 set thread context of 2320 2996 word.exe 41 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.xyz Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.xyz -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 1.xyz 2996 word.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2344 1.xyz 2344 1.xyz 2996 word.exe 2996 word.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2344 1820 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 29 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2224 2344 1.xyz 30 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2796 2344 1.xyz 32 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2344 wrote to memory of 2852 2344 1.xyz 33 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2852 wrote to memory of 2996 2852 1.xyz 35 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2796 wrote to memory of 2924 2796 cmd.exe 36 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2924 wrote to memory of 2692 2924 net.exe 37 PID 2996 wrote to memory of 2664 2996 word.exe 38 PID 2996 wrote to memory of 2664 2996 word.exe 38 PID 2996 wrote to memory of 2664 2996 word.exe 38 PID 2996 wrote to memory of 2664 2996 word.exe 38 PID 2996 wrote to memory of 2664 2996 word.exe 38 PID 2996 wrote to memory of 2664 2996 word.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\Install\word.exe"C:\Users\Admin\AppData\Roaming\Install\word.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\word.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc6⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc7⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
-
C:\Users\Admin\AppData\Roaming\Install\word.exe"C:\Users\Admin\AppData\Roaming\Install\word.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5890001245d7da1fb3ff511443c74be01
SHA1c54489f248a5767530e427fe7eee77755d2678d1
SHA256e3dc49602ba099c79c88238efecdb7b7cd7b3b6c8381eaf1bcd6e886bd6500b3
SHA512ef6b3c8a72b3dbcf769037a748074e447c8f57636d9ea168c2d0796b5b2be2dfdad5f5f562b24ef9fd353405cbc5e3a1a0ff4f3330b5f9a513904867d402301b
-
Filesize
110B
MD53017413ac0cf5f9ac43a02c69baec23f
SHA17a0d6082f1b3cf17c3268b4767944466dc4410e9
SHA256a9a1056bf3150cdb24af4b4e2742527abc55243ed0742f2ea628104c87f1a4ed
SHA512882ed5f44ba53af1bfbb8e1c4e7689a28f3a86bc2302cfdd128fe49838e97b3daaccfbed78d6eded24474e947fa86225bdb3cb184f1b0ef9d614c3aa1bdc8dd1
-
Filesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932