General
-
Target
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae
-
Size
1016KB
-
Sample
241231-dlgehs1mcr
-
MD5
0201fb9044d3a3c0f2b1c51ba67175ae
-
SHA1
ba81de9830374380eaa3f0b3be47392506ae43b4
-
SHA256
0be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
-
SHA512
ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e
-
SSDEEP
12288:df2mP+FAfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7lL3RxHNZCc1VYdLBcaczG:A+SAklQrnnaRcWg4A
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe
Resource
win7-20240903-en
Malware Config
Extracted
netwire
194.147.140.22:1988
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Targets
-
-
Target
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae
-
Size
1016KB
-
MD5
0201fb9044d3a3c0f2b1c51ba67175ae
-
SHA1
ba81de9830374380eaa3f0b3be47392506ae43b4
-
SHA256
0be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
-
SHA512
ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e
-
SSDEEP
12288:df2mP+FAfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7lL3RxHNZCc1VYdLBcaczG:A+SAklQrnnaRcWg4A
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1