General
-
Target
0a3769db6a54f333863175a07dd9087f_JaffaCakes118
-
Size
120KB
-
Sample
241002-mj1vtavfqh
-
MD5
0a3769db6a54f333863175a07dd9087f
-
SHA1
f7ec8045756e4ba3af748fef35590aa41766454c
-
SHA256
cac8fe9363cd9e2a31aeb383fe2df3800a4ca35edbe9c697093a13f1067f0292
-
SHA512
9315eb828d82ddecf54e2675ee495d481dcfe88e515dd41ccd8da1a0914b7cfad529027503700b05787fdb230fd5e646e82f3d43342723bd08cb5241de3ec572
-
SSDEEP
1536:m5Tzro/5XkgEUs6MB0nUQP9TswNnZ7UgIoDlklyEYwuoVMG5W7QZg7II/CwDPTxU:AO5Xk7Us6NnVACZpNklyBG5iWItD92v
Static task
static1
Behavioral task
behavioral1
Sample
0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
ghjghjjhgjhgjhjhgjh.zapto.org:20000
-
activex_autorun
true
-
activex_key
{5D03ES3I-Y34Q-83S6-0YJQ-4M3410JYQ88K}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Extracted
latentbot
ghjghjjhgjhgjhjhgjh.zapto.org
Targets
-
-
Target
0a3769db6a54f333863175a07dd9087f_JaffaCakes118
-
Size
120KB
-
MD5
0a3769db6a54f333863175a07dd9087f
-
SHA1
f7ec8045756e4ba3af748fef35590aa41766454c
-
SHA256
cac8fe9363cd9e2a31aeb383fe2df3800a4ca35edbe9c697093a13f1067f0292
-
SHA512
9315eb828d82ddecf54e2675ee495d481dcfe88e515dd41ccd8da1a0914b7cfad529027503700b05787fdb230fd5e646e82f3d43342723bd08cb5241de3ec572
-
SSDEEP
1536:m5Tzro/5XkgEUs6MB0nUQP9TswNnZ7UgIoDlklyEYwuoVMG5W7QZg7II/CwDPTxU:AO5Xk7Us6NnVACZpNklyBG5iWItD92v
-
NetWire RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1