Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe
-
Size
427KB
-
MD5
cdacadda6a7ecfb449310a3f92bbd6de
-
SHA1
ae7520c09469cce70d9495d9092c49f176dac67c
-
SHA256
709461e5e465b5b776ceb72a7fa69772cb97460ad5daf8dbe756e0614678d2e3
-
SHA512
9314a3e2b69f9bdd6f208e9d3e3647baa640d26e20ffa60db7ce1e027b0af4380a7b8a63b8b477119f5fb2596e218843bcf6387d75dd31eab64b637d3515711e
-
SSDEEP
6144:ojbei8D7JNEeHfZEW6GH5W288Lhvb5HEGa+00bivT0HdibcIAKZ0:ou7tzgGH5W28UvbeGrZOhcc0
Malware Config
Extracted
netwire
qualitytrade12.hopto.org:3194
-
activex_autorun
true
-
activex_key
{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V}
-
copy_executable
true
-
delete_original
false
-
host_id
NEWCLIENT
-
install_path
%AppData%\Install\word.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
IAqepjWi
-
offline_keylogger
true
-
password
master45
-
registry_autorun
true
-
startup_name
Mozila
-
use_mutex
true
Signatures
-
NetWire RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2164-15-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/2164-17-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/2164-19-0x0000000000400000-0x0000000001080000-memory.dmp netwire behavioral2/memory/2164-24-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral2/memory/1380-42-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V} word.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48X0572Q-0821-53L8-APT1-5H6W1WP21L7V}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\word.exe\"" word.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 3656 1.xyz 2164 1.xyz 4908 word.exe 1380 word.exe -
resource yara_rule behavioral2/files/0x00080000000234c4-5.dat upx behavioral2/memory/3656-40-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral2/memory/4908-41-0x0000000000400000-0x0000000001400000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mozila = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\word.exe" word.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3656 set thread context of 2164 3656 1.xyz 91 PID 4908 set thread context of 1380 4908 word.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.xyz Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.xyz Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3656 1.xyz 3656 1.xyz 4908 word.exe 4908 word.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3656 1.xyz 3656 1.xyz 4908 word.exe 4908 word.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3656 1308 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 84 PID 1308 wrote to memory of 3656 1308 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 84 PID 1308 wrote to memory of 3656 1308 cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe 84 PID 3656 wrote to memory of 2276 3656 1.xyz 88 PID 3656 wrote to memory of 2276 3656 1.xyz 88 PID 3656 wrote to memory of 2276 3656 1.xyz 88 PID 3656 wrote to memory of 4956 3656 1.xyz 90 PID 3656 wrote to memory of 4956 3656 1.xyz 90 PID 3656 wrote to memory of 4956 3656 1.xyz 90 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 3656 wrote to memory of 2164 3656 1.xyz 91 PID 2164 wrote to memory of 4908 2164 1.xyz 93 PID 2164 wrote to memory of 4908 2164 1.xyz 93 PID 2164 wrote to memory of 4908 2164 1.xyz 93 PID 4956 wrote to memory of 3060 4956 cmd.exe 94 PID 4956 wrote to memory of 3060 4956 cmd.exe 94 PID 4956 wrote to memory of 3060 4956 cmd.exe 94 PID 3060 wrote to memory of 4700 3060 net.exe 95 PID 3060 wrote to memory of 4700 3060 net.exe 95 PID 3060 wrote to memory of 4700 3060 net.exe 95 PID 4908 wrote to memory of 632 4908 word.exe 98 PID 4908 wrote to memory of 632 4908 word.exe 98 PID 4908 wrote to memory of 632 4908 word.exe 98 PID 4908 wrote to memory of 5104 4908 word.exe 100 PID 4908 wrote to memory of 5104 4908 word.exe 100 PID 4908 wrote to memory of 5104 4908 word.exe 100 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 4908 wrote to memory of 1380 4908 word.exe 102 PID 5104 wrote to memory of 1716 5104 cmd.exe 103 PID 5104 wrote to memory of 1716 5104 cmd.exe 103 PID 5104 wrote to memory of 1716 5104 cmd.exe 103 PID 1716 wrote to memory of 4024 1716 net.exe 104 PID 1716 wrote to memory of 4024 1716 net.exe 104 PID 1716 wrote to memory of 4024 1716 net.exe 104 PID 4908 wrote to memory of 1380 4908 word.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdacadda6a7ecfb449310a3f92bbd6de_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyzC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.xyz3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Roaming\Install\word.exe"C:\Users\Admin\AppData\Roaming\Install\word.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\word.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc7⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
-
-
C:\Users\Admin\AppData\Roaming\Install\word.exe"C:\Users\Admin\AppData\Roaming\Install\word.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5890001245d7da1fb3ff511443c74be01
SHA1c54489f248a5767530e427fe7eee77755d2678d1
SHA256e3dc49602ba099c79c88238efecdb7b7cd7b3b6c8381eaf1bcd6e886bd6500b3
SHA512ef6b3c8a72b3dbcf769037a748074e447c8f57636d9ea168c2d0796b5b2be2dfdad5f5f562b24ef9fd353405cbc5e3a1a0ff4f3330b5f9a513904867d402301b
-
Filesize
212KB
MD5b2af3b332d92fc09b79c4bf85263fd22
SHA1cbb3c3a4b17ba2888cfd0b96f59a5bc454d4ef32
SHA256b9dd8dfdb9a3fd61b2acffe0018cdf99b02c97025ae0d41a7aac7c9d76647b58
SHA512b6d7271b1b0e7285bff25b8edb0f31cc7076bbbf611a4bfa9a457463c38ba7d0f5694f89b18a5b26b0f793e76dc0a0e5279dbf4cf976a6b52787157523e17932