Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
-
Size
670KB
-
MD5
20180a09bd56f0614df702155b59eb22
-
SHA1
a965cd7150fb405653d59994344b4941c8fdf6be
-
SHA256
55b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
-
SHA512
c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb
-
SSDEEP
6144:F2n5g3PZMegQUFyGy+3Lg57V1OnheX88VVcPnxSXeqpZE4GRfKx/8GcsMBvMCmJO:F252EQUFuCgJ/s2q5Gep4E+esTCmfU
Malware Config
Extracted
netwire
centos4u.strangled.net:1337
centos44.myftp.biz:1337
-
activex_autorun
true
-
activex_key
{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0}
-
copy_executable
true
-
delete_original
false
-
host_id
ZOZO
-
install_path
%AppData%\Adobe\Firefox.exe
-
keylogger_dir
%AppData%\L0JJ\
-
lock_executable
true
-
mutex
RvPShIvm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Defenderss
-
use_mutex
true
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/memory/1256-59-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1256-61-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1256-72-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2260-96-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2260-101-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2260-102-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/2748-62-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral1/memory/2748-73-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral1/memory/604-86-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral1/memory/604-87-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral1/memory/604-97-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Firefox.exe\"" Firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0} Firefox.exe -
Executes dropped EXE 2 IoCs
pid Process 604 Firefox.exe 2260 Firefox.exe -
Loads dropped DLL 3 IoCs
pid Process 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 604 Firefox.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defenderss = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Firefox.exe" Firefox.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 Firefox.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2748 set thread context of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 604 set thread context of 2260 604 Firefox.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 604 Firefox.exe 604 Firefox.exe 604 Firefox.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 2748 wrote to memory of 1256 2748 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 30 PID 1256 wrote to memory of 604 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 31 PID 1256 wrote to memory of 604 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 31 PID 1256 wrote to memory of 604 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 31 PID 1256 wrote to memory of 604 1256 20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe 31 PID 604 wrote to memory of 2260 604 Firefox.exe 32 PID 604 wrote to memory of 2260 604 Firefox.exe 32 PID 604 wrote to memory of 2260 604 Firefox.exe 32 PID 604 wrote to memory of 2260 604 Firefox.exe 32 PID 604 wrote to memory of 2260 604 Firefox.exe 32 PID 604 wrote to memory of 2260 604 Firefox.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"C:\Users\Admin\AppData\Roaming\Adobe\Firefox.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:2260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670KB
MD520180a09bd56f0614df702155b59eb22
SHA1a965cd7150fb405653d59994344b4941c8fdf6be
SHA25655b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
SHA512c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb