Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 04:47
Behavioral task
behavioral1
Sample
ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe
-
Size
106KB
-
MD5
ecde06e1a14552eaf60c4528b2a6ca0f
-
SHA1
a389f943336a177dc8c428c633f5485cb2c5738d
-
SHA256
05757375b4f24540c9f0bfbb11415110e977938469ef9b795b8689a8b7778607
-
SHA512
e7c6d590b295176342093004f1cec80fa606b850e039855a5c4c94ba8eb52e6e76053eb4623efb0c5c5b23cf1165379002fa7af271cee11593f4d0b41918864f
-
SSDEEP
3072:ROzIy5XGViztldWl88Yed2DQuIAQvQ+d0aYMRX:Ro2ViztvWlvd2UuIAQvQ+yFMR
Malware Config
Extracted
netwire
160.116.15.156:52172
-
activex_autorun
true
-
activex_key
{I455DRC2-IJ0A-3858-556A-HB4KTH7T318F}
-
copy_executable
true
-
delete_original
false
-
host_id
MON
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
IdrRPweA
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015cf1-9.dat netwire behavioral1/memory/2420-8-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1284-10-0x0000000000400000-0x0000000000425000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I455DRC2-IJ0A-3858-556A-HB4KTH7T318F} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I455DRC2-IJ0A-3858-556A-HB4KTH7T318F}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Executes dropped EXE 1 IoCs
pid Process 1284 Host.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1284 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1284 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1284 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1284 2420 ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecde06e1a14552eaf60c4528b2a6ca0f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5ecde06e1a14552eaf60c4528b2a6ca0f
SHA1a389f943336a177dc8c428c633f5485cb2c5738d
SHA25605757375b4f24540c9f0bfbb11415110e977938469ef9b795b8689a8b7778607
SHA512e7c6d590b295176342093004f1cec80fa606b850e039855a5c4c94ba8eb52e6e76053eb4623efb0c5c5b23cf1165379002fa7af271cee11593f4d0b41918864f