Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
-
Size
363KB
-
MD5
f1583cede77b634f2dd7f8807319d4f0
-
SHA1
5e87a07e3843f7fa3e190ef47f7a8e268e7533c8
-
SHA256
f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3
-
SHA512
858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d
-
SSDEEP
6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu
Malware Config
Extracted
netwire
88.119.175.41:3365
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
Olu
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iGVOQFlr
-
offline_keylogger
true
-
password
Ktgv4%+,%S
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2892-52-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2892-51-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-30-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-34-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-36-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-43-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-41-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-39-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2892-32-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2552-88-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral1/memory/2552-90-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 @.cmd 2892 @.cmd 2908 Host.exe 2552 Host.exe -
Loads dropped DLL 8 IoCs
pid Process 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 2932 @.cmd 2892 @.cmd 2892 @.cmd 2908 Host.exe 2908 Host.exe 2552 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 2892 2932 @.cmd 34 PID 2908 set thread context of 2552 2908 Host.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @.cmd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @.cmd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 @.cmd 2908 Host.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2932 @.cmd 2932 @.cmd 2908 Host.exe 2908 Host.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2932 2820 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2956 2932 @.cmd 31 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2996 2932 @.cmd 33 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2996 wrote to memory of 2748 2996 cmd.exe 36 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2748 wrote to memory of 2856 2748 net.exe 37 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2932 wrote to memory of 2892 2932 @.cmd 34 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2892 wrote to memory of 2908 2892 @.cmd 38 PID 2908 wrote to memory of 2784 2908 Host.exe 39 PID 2908 wrote to memory of 2784 2908 Host.exe 39 PID 2908 wrote to memory of 2784 2908 Host.exe 39 PID 2908 wrote to memory of 2784 2908 Host.exe 39 PID 2908 wrote to memory of 2784 2908 Host.exe 39 PID 2908 wrote to memory of 2784 2908 Host.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmdC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmdC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\Host.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc6⤵
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc7⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5654ac265df471b3b1747695fa19cc226
SHA11a0b7674e906b8661977c17c74f66b2172524085
SHA256f1ead6d6c1b1515a0f781783cf8f929cd403aeaaeaef55ee03c3c1e7a983148a
SHA5125a23074054cc8261f77835d55355cecaf3914982ca4bc705bce0f29a259fea6b750b65e753ec1d98b2c4d4e4f893426ccdc3d1451899e7247e5d903bb0ee0f21
-
Filesize
408KB
MD5de8517147501bb8972fb16635580f3ba
SHA17f806c1ceca11217110c85ffb8ce4d076179b40a
SHA256d7a3315f872243c28bd95fb75ed3b007821a2dea25f78afd8cbaaca1d853ef4f
SHA512c6dd32cd44569e9367ae447791c1554903bdba7c35729e46cdfec8cbdd3194aa192cdc95fe224917b7cf7c8c7818cb0da0bf787d59e7e4dbad925dd8426d940f