General
-
Target
d73e7f87a3a95e0f16337c29a6546efa_JaffaCakes118
-
Size
204KB
-
Sample
240909-248tgsvenm
-
MD5
d73e7f87a3a95e0f16337c29a6546efa
-
SHA1
753398b57ac5a470d4c2573e1b51cb3ed783e834
-
SHA256
032f82ee87063844044f26e9c171170ee56b5e480a26402371018512fb92ff6a
-
SHA512
e966fcfc3fb032e6b602f5bfcbc5842a9c88a8427096f9902e2ec12d08f30c851104c10f10824b084a1e18cf6e9e44114d5f3fd1f688a3d8db6e805976ed4b25
-
SSDEEP
3072:IxuGg5NaeP3qQKvVpXNdXpstoSjvdQXsAs1XMTsx+7llitfMA6Nbrk42o/O:IsXagIVpXNUtoyHVMlmdt6Nfk42o/O
Static task
static1
Behavioral task
behavioral1
Sample
d73e7f87a3a95e0f16337c29a6546efa_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
185.125.205.77:39560
-
activex_autorun
true
-
activex_key
{51ER3LW3-6YXE-YD6F-5ROI-AF1JX466T30G}
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Svchost.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
mutex
BdenlrBn
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
d73e7f87a3a95e0f16337c29a6546efa_JaffaCakes118
-
Size
204KB
-
MD5
d73e7f87a3a95e0f16337c29a6546efa
-
SHA1
753398b57ac5a470d4c2573e1b51cb3ed783e834
-
SHA256
032f82ee87063844044f26e9c171170ee56b5e480a26402371018512fb92ff6a
-
SHA512
e966fcfc3fb032e6b602f5bfcbc5842a9c88a8427096f9902e2ec12d08f30c851104c10f10824b084a1e18cf6e9e44114d5f3fd1f688a3d8db6e805976ed4b25
-
SSDEEP
3072:IxuGg5NaeP3qQKvVpXNdXpstoSjvdQXsAs1XMTsx+7llitfMA6Nbrk42o/O:IsXagIVpXNUtoyHVMlmdt6Nfk42o/O
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1