General
-
Target
d97dc7068c3264ec0ef8d228db33ef12_JaffaCakes118
-
Size
300KB
-
Sample
240911-dejlasyfnk
-
MD5
d97dc7068c3264ec0ef8d228db33ef12
-
SHA1
cc811a1ced21af00d47968f87f7c2a6198dffad7
-
SHA256
2e60d3cd818fa132f8425b50f8a1de53fb7c1ebfa050bd3891a4f5c97971bf10
-
SHA512
bde02f49f92a39a51ee683522201a83fb6651df424400a0a1b39c00aa74f5ab05dda60f75354467c8ef6c2b535c365dcd68dd86c93b51577afbf2a2fa5dd2be9
-
SSDEEP
6144:2EAidq19l2sJmwh4HYRYtEWBzhlANcjat9w44mKZ:2E6N44RQEW54m+934zZ
Static task
static1
Behavioral task
behavioral1
Sample
d97dc7068c3264ec0ef8d228db33ef12_JaffaCakes118.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d97dc7068c3264ec0ef8d228db33ef12_JaffaCakes118.msi
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
wealthymachine.ddns.net:39560
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
sunshineslisa
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
d97dc7068c3264ec0ef8d228db33ef12_JaffaCakes118
-
Size
300KB
-
MD5
d97dc7068c3264ec0ef8d228db33ef12
-
SHA1
cc811a1ced21af00d47968f87f7c2a6198dffad7
-
SHA256
2e60d3cd818fa132f8425b50f8a1de53fb7c1ebfa050bd3891a4f5c97971bf10
-
SHA512
bde02f49f92a39a51ee683522201a83fb6651df424400a0a1b39c00aa74f5ab05dda60f75354467c8ef6c2b535c365dcd68dd86c93b51577afbf2a2fa5dd2be9
-
SSDEEP
6144:2EAidq19l2sJmwh4HYRYtEWBzhlANcjat9w44mKZ:2E6N44RQEW54m+934zZ
-
NetWire RAT payload
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-