Analysis
-
max time kernel
109s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 16:35
Behavioral task
behavioral1
Sample
f033632987f48ecf30c522590dde44fe_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f033632987f48ecf30c522590dde44fe_JaffaCakes118.exe
-
Size
120KB
-
MD5
f033632987f48ecf30c522590dde44fe
-
SHA1
d5408bb9c013a75b3953e09f2e29eb862ce678be
-
SHA256
2e5b866666634830c3578f8cf1eebbadc9955249adf44ce7279bf20a8309bc51
-
SHA512
22da78edebbbd5b90133f58df635b15dda69b8de0201e8dfbe049cccf3ab49e59f4c34d764b030ac703fe1ad2329aea38384c5e0892dfc51541f7865b6c29632
-
SSDEEP
3072:CLp3Yvhn9VI8VjCX1I43fAwegLMfrGhe:CLKvhnDIBSilL7o
Malware Config
Extracted
Family
netwire
C2
ecx.ddns.net:8484
Attributes
-
activex_autorun
false
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
ecxexx
-
registry_autorun
true
-
startup_name
scan
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1308-2-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f033632987f48ecf30c522590dde44fe_JaffaCakes118.exe