Analysis
-
max time kernel
115s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe
-
Size
367KB
-
MD5
d8959d67b5ad1af0bd2c8436d8caf1af
-
SHA1
b5da6b6495219b49f50f0fd68dccf3d0079f206a
-
SHA256
9f2d5f8c077dbdbc35cb37aabfa9d63c6bce86443cb1a4fc2a820a6ef9568c6d
-
SHA512
f91c819705846b7b93666376ad485ec97b400acb4aacbf7da83a830e47702184bb3dbdc73e0553e2bd8b99a4b4003512e05864e66e53549ab80bce0410360533
-
SSDEEP
6144:37YWgp8Jqj3uTE92U1YWgp8Jqj3uTE92UuW6EFvp6/YX5fH1huypYabVY78N7UbE:3UFqY+TEAxFqY+TEAVWJ6QpfPzYab6Qn
Malware Config
Extracted
netwire
fada101.servehttp.com:3360
-
activex_autorun
true
-
activex_key
{ML38R11G-GURP-G731-0R0R-YG3Y3Y2RWAXB}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4112-5-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4112-8-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/4112-20-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/1244-32-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/1244-33-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ML38R11G-GURP-G731-0R0R-YG3Y3Y2RWAXB} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ML38R11G-GURP-G731-0R0R-YG3Y3Y2RWAXB}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1588 Host.exe 1244 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 264 set thread context of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 1588 set thread context of 1244 1588 Host.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 264 wrote to memory of 4112 264 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 94 PID 4112 wrote to memory of 1588 4112 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 95 PID 4112 wrote to memory of 1588 4112 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 95 PID 4112 wrote to memory of 1588 4112 d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe 95 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96 PID 1588 wrote to memory of 1244 1588 Host.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\d8959d67b5ad1af0bd2c8436d8caf1af_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5d8959d67b5ad1af0bd2c8436d8caf1af
SHA1b5da6b6495219b49f50f0fd68dccf3d0079f206a
SHA2569f2d5f8c077dbdbc35cb37aabfa9d63c6bce86443cb1a4fc2a820a6ef9568c6d
SHA512f91c819705846b7b93666376ad485ec97b400acb4aacbf7da83a830e47702184bb3dbdc73e0553e2bd8b99a4b4003512e05864e66e53549ab80bce0410360533