Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 20:13
Behavioral task
behavioral1
Sample
JaffaCakes118_df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675.exe
-
Size
160KB
-
MD5
a171475610296de3ac58efa9198ec45b
-
SHA1
33538a0d66926ba351453c953e1ff942409bf957
-
SHA256
df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675
-
SHA512
8491d8b208e42049e119b0685080c9c953bc76b12be13e6a6247dcf20a7d5df07a1a53a7417ffed30b044b9f9f9dd619624be7ca3a1d1b0e7230700b22015a7c
-
SSDEEP
3072:zOzPcXa+ND32eioGHlz8rnAE0HCXh0edLv0iYMjMqqDvFf:zOTcK+NrRioGHlz8rz0i/NzQqqDvFf
Malware Config
Extracted
netwire
66.154.103.106:13371
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-kgGkqq
-
lock_executable
false
-
offline_keylogger
false
-
password
Password@123
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4072-0-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_df770e3e67ca9ec6f2151b7b9dd8d4946d62d0970d7915286c79cba3c8bd8675.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4072