Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe
-
Size
363KB
-
MD5
f1583cede77b634f2dd7f8807319d4f0
-
SHA1
5e87a07e3843f7fa3e190ef47f7a8e268e7533c8
-
SHA256
f657d23b0f5e8c046f6c345a7bf78ac8a2f95f5b6c8bfe11effd6e986b046ef3
-
SHA512
858cc1a05aeb5c4d17bb390f5f481e4425ebc5d9c0bec9b3b92bca6d693a654d0d483003081c68927fd345e77ac2ca5fc2d1f1087fa2a8abfb23efe7c0a6116d
-
SSDEEP
6144:WjbeiJX2WZxNZTOqv+PpF5WbRgWqIw4TMc6qYL7IAfFnCOwXkOnTKyJmYB:WukZjNZTOu+RSgsTMjqpWnCDXkOTKygu
Malware Config
Extracted
netwire
88.119.175.41:3365
-
activex_autorun
false
-
copy_executable
true
-
delete_original
true
-
host_id
Olu
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iGVOQFlr
-
offline_keylogger
true
-
password
Ktgv4%+,%S
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral2/memory/2096-18-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral2/memory/2096-26-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2096-22-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral2/memory/2096-20-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral2/memory/3460-40-0x0000000000400000-0x0000000000FB8000-memory.dmp netwire behavioral2/memory/3460-43-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 3292 @.cmd 2096 @.cmd 3136 Host.exe 3460 Host.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3292 set thread context of 2096 3292 @.cmd 87 PID 3136 set thread context of 3460 3136 Host.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @.cmd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @.cmd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3292 @.cmd 3292 @.cmd 3136 Host.exe 3136 Host.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3292 @.cmd 3292 @.cmd 3136 Host.exe 3136 Host.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3292 4480 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 83 PID 4480 wrote to memory of 3292 4480 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 83 PID 4480 wrote to memory of 3292 4480 f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe 83 PID 3292 wrote to memory of 3980 3292 @.cmd 84 PID 3292 wrote to memory of 3980 3292 @.cmd 84 PID 3292 wrote to memory of 3980 3292 @.cmd 84 PID 3292 wrote to memory of 3236 3292 @.cmd 86 PID 3292 wrote to memory of 3236 3292 @.cmd 86 PID 3292 wrote to memory of 3236 3292 @.cmd 86 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 3292 wrote to memory of 2096 3292 @.cmd 87 PID 2096 wrote to memory of 3136 2096 @.cmd 89 PID 2096 wrote to memory of 3136 2096 @.cmd 89 PID 2096 wrote to memory of 3136 2096 @.cmd 89 PID 3236 wrote to memory of 4220 3236 cmd.exe 90 PID 3236 wrote to memory of 4220 3236 cmd.exe 90 PID 3236 wrote to memory of 4220 3236 cmd.exe 90 PID 4220 wrote to memory of 1920 4220 net.exe 91 PID 4220 wrote to memory of 1920 4220 net.exe 91 PID 4220 wrote to memory of 1920 4220 net.exe 91 PID 3136 wrote to memory of 2152 3136 Host.exe 92 PID 3136 wrote to memory of 2152 3136 Host.exe 92 PID 3136 wrote to memory of 2152 3136 Host.exe 92 PID 3136 wrote to memory of 1656 3136 Host.exe 94 PID 3136 wrote to memory of 1656 3136 Host.exe 94 PID 3136 wrote to memory of 1656 3136 Host.exe 94 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 3136 wrote to memory of 3460 3136 Host.exe 95 PID 1656 wrote to memory of 4564 1656 cmd.exe 97 PID 1656 wrote to memory of 4564 1656 cmd.exe 97 PID 1656 wrote to memory of 4564 1656 cmd.exe 97 PID 4564 wrote to memory of 4076 4564 net.exe 98 PID 4564 wrote to memory of 4076 4564 net.exe 98 PID 4564 wrote to memory of 4076 4564 net.exe 98 PID 3136 wrote to memory of 3460 3136 Host.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1583cede77b634f2dd7f8807319d4f0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmdC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmdC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\@.cmd"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Roaming\Install\Host.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc7⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeC:\Users\Admin\AppData\Roaming\Install\Host.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5654ac265df471b3b1747695fa19cc226
SHA11a0b7674e906b8661977c17c74f66b2172524085
SHA256f1ead6d6c1b1515a0f781783cf8f929cd403aeaaeaef55ee03c3c1e7a983148a
SHA5125a23074054cc8261f77835d55355cecaf3914982ca4bc705bce0f29a259fea6b750b65e753ec1d98b2c4d4e4f893426ccdc3d1451899e7247e5d903bb0ee0f21
-
Filesize
408KB
MD5de8517147501bb8972fb16635580f3ba
SHA17f806c1ceca11217110c85ffb8ce4d076179b40a
SHA256d7a3315f872243c28bd95fb75ed3b007821a2dea25f78afd8cbaaca1d853ef4f
SHA512c6dd32cd44569e9367ae447791c1554903bdba7c35729e46cdfec8cbdd3194aa192cdc95fe224917b7cf7c8c7818cb0da0bf787d59e7e4dbad925dd8426d940f
-
Filesize
110B
MD50c34c1e07c3a00dd4f6c4185b40c66c4
SHA1980a47c9c6d44ddff853282e903a4b561fac5942
SHA2569c50ec3824a267d8756bc8e137bff24126afb044937468a507cb688a1a31fdf6
SHA5124db5410845364484f4d9bdb9766d5e235095d7d65f8488fb9faa9cf06bc19a597bee03571a4e09be9c598d36da5b91f8feb2afcdedd028920e9672ef2cb81355