Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 10:30 UTC

General

  • Target

    0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    0a3769db6a54f333863175a07dd9087f

  • SHA1

    f7ec8045756e4ba3af748fef35590aa41766454c

  • SHA256

    cac8fe9363cd9e2a31aeb383fe2df3800a4ca35edbe9c697093a13f1067f0292

  • SHA512

    9315eb828d82ddecf54e2675ee495d481dcfe88e515dd41ccd8da1a0914b7cfad529027503700b05787fdb230fd5e646e82f3d43342723bd08cb5241de3ec572

  • SSDEEP

    1536:m5Tzro/5XkgEUs6MB0nUQP9TswNnZ7UgIoDlklyEYwuoVMG5W7QZg7II/CwDPTxU:AO5Xk7Us6NnVACZpNklyBG5iWItD92v

Malware Config

Extracted

Family

netwire

C2

ghjghjjhgjhgjhjhgjh.zapto.org:20000

Attributes
  • activex_autorun

    true

  • activex_key

    {5D03ES3I-Y34Q-83S6-0YJQ-4M3410JYQ88K}

  • copy_executable

    true

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • install_path

    %AppData%\Install\Host.exe

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    true

  • startup_name

    NetWire

  • use_mutex

    false

Extracted

Family

latentbot

C2

ghjghjjhgjhgjhjhgjh.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0a3769db6a54f333863175a07dd9087f_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          PID:4792

Network

  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    154.239.44.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    154.239.44.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    26.165.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.165.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
  • flag-us
    DNS
    ghjghjjhgjhgjhjhgjh.zapto.org
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    ghjghjjhgjhgjhjhgjh.zapto.org
    IN A
    Response
No results found
  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    154.239.44.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    154.239.44.20.in-addr.arpa

  • 8.8.8.8:53
    26.165.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    26.165.165.52.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    150 B
    135 B
    2
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

  • 8.8.8.8:53
    ghjghjjhgjhgjhjhgjh.zapto.org
    dns
    Host.exe
    75 B
    135 B
    1
    1

    DNS Request

    ghjghjjhgjhgjhjhgjh.zapto.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Install\Host.exe

    Filesize

    120KB

    MD5

    0a3769db6a54f333863175a07dd9087f

    SHA1

    f7ec8045756e4ba3af748fef35590aa41766454c

    SHA256

    cac8fe9363cd9e2a31aeb383fe2df3800a4ca35edbe9c697093a13f1067f0292

    SHA512

    9315eb828d82ddecf54e2675ee495d481dcfe88e515dd41ccd8da1a0914b7cfad529027503700b05787fdb230fd5e646e82f3d43342723bd08cb5241de3ec572

  • memory/2128-2-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/2128-3-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/2324-23-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2324-29-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4284-4-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4284-6-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4284-20-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4792-27-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4792-28-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4792-30-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.