General
-
Target
d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118
-
Size
367KB
-
Sample
240910-txc48sthrh
-
MD5
d8959d67b5ad1af0bd2c8436d8caf1af
-
SHA1
b5da6b6495219b49f50f0fd68dccf3d0079f206a
-
SHA256
9f2d5f8c077dbdbc35cb37aabfa9d63c6bce86443cb1a4fc2a820a6ef9568c6d
-
SHA512
f91c819705846b7b93666376ad485ec97b400acb4aacbf7da83a830e47702184bb3dbdc73e0553e2bd8b99a4b4003512e05864e66e53549ab80bce0410360533
-
SSDEEP
6144:37YWgp8Jqj3uTE92U1YWgp8Jqj3uTE92UuW6EFvp6/YX5fH1huypYabVY78N7UbE:3UFqY+TEAxFqY+TEAVWJ6QpfPzYab6Qn
Static task
static1
Behavioral task
behavioral1
Sample
d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
fada101.servehttp.com:3360
-
activex_autorun
true
-
activex_key
{ML38R11G-GURP-G731-0R0R-YG3Y3Y2RWAXB}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118
-
Size
367KB
-
MD5
d8959d67b5ad1af0bd2c8436d8caf1af
-
SHA1
b5da6b6495219b49f50f0fd68dccf3d0079f206a
-
SHA256
9f2d5f8c077dbdbc35cb37aabfa9d63c6bce86443cb1a4fc2a820a6ef9568c6d
-
SHA512
f91c819705846b7b93666376ad485ec97b400acb4aacbf7da83a830e47702184bb3dbdc73e0553e2bd8b99a4b4003512e05864e66e53549ab80bce0410360533
-
SSDEEP
6144:37YWgp8Jqj3uTE92U1YWgp8Jqj3uTE92UuW6EFvp6/YX5fH1huypYabVY78N7UbE:3UFqY+TEAxFqY+TEAVWJ6QpfPzYab6Qn
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1