Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe
-
Size
1016KB
-
MD5
0201fb9044d3a3c0f2b1c51ba67175ae
-
SHA1
ba81de9830374380eaa3f0b3be47392506ae43b4
-
SHA256
0be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
-
SHA512
ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e
-
SSDEEP
12288:df2mP+FAfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7lL3RxHNZCc1VYdLBcaczG:A+SAklQrnnaRcWg4A
Malware Config
Extracted
netwire
194.147.140.22:1988
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2824-17-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-22-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-20-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-25-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-15-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-14-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/2824-13-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/332-51-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Executes dropped EXE 2 IoCs
pid Process 2664 Host.exe 332 Host.exe -
Loads dropped DLL 1 IoCs
pid Process 2824 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2416 set thread context of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2664 set thread context of 332 2664 Host.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2380 schtasks.exe 648 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2380 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 32 PID 2416 wrote to memory of 2380 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 32 PID 2416 wrote to memory of 2380 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 32 PID 2416 wrote to memory of 2380 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 32 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2416 wrote to memory of 2824 2416 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 34 PID 2824 wrote to memory of 2664 2824 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 35 PID 2824 wrote to memory of 2664 2824 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 35 PID 2824 wrote to memory of 2664 2824 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 35 PID 2824 wrote to memory of 2664 2824 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 35 PID 2664 wrote to memory of 648 2664 Host.exe 36 PID 2664 wrote to memory of 648 2664 Host.exe 36 PID 2664 wrote to memory of 648 2664 Host.exe 36 PID 2664 wrote to memory of 648 2664 Host.exe 36 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38 PID 2664 wrote to memory of 332 2664 Host.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KktdAJzRWbu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp45B7.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"{path}"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KktdAJzRWbu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB22F.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:648
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e9b5b0105e0aab1afd522b5969503370
SHA1a3e094cdd52335c48ccca53a176a9328c1122be0
SHA256b20f512a8a6298b3c72e9e92d119f46d0dc1eedf559b2a63802a2bf1442f5030
SHA512de314eee727a47d7c3f8da859cee5853da76f95e1dff7aaa7d98e1028127a6f0bea7f6e047b6ac5895b2f34d36c3981df6b42c044189ff9178a9ca04896fd05f
-
Filesize
1016KB
MD50201fb9044d3a3c0f2b1c51ba67175ae
SHA1ba81de9830374380eaa3f0b3be47392506ae43b4
SHA2560be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
SHA512ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e