Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe
-
Size
1016KB
-
MD5
0201fb9044d3a3c0f2b1c51ba67175ae
-
SHA1
ba81de9830374380eaa3f0b3be47392506ae43b4
-
SHA256
0be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
-
SHA512
ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e
-
SSDEEP
12288:df2mP+FAfBSkkkkkkkkkkkkkkx9L+kIkkvkkkkkkkk7lL3RxHNZCc1VYdLBcaczG:A+SAklQrnnaRcWg4A
Malware Config
Extracted
netwire
194.147.140.22:1988
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3872-9-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3872-12-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3872-14-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3876-37-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Netwire family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Host.exe -
Executes dropped EXE 4 IoCs
pid Process 4488 Host.exe 2796 Host.exe 716 Host.exe 3876 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3536 set thread context of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 4488 set thread context of 3876 4488 Host.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe 2680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 4488 Host.exe 4488 Host.exe 4488 Host.exe 4488 Host.exe 4488 Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe Token: SeDebugPrivilege 4488 Host.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3536 wrote to memory of 2684 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 96 PID 3536 wrote to memory of 2684 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 96 PID 3536 wrote to memory of 2684 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 96 PID 3536 wrote to memory of 3988 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 99 PID 3536 wrote to memory of 3988 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 99 PID 3536 wrote to memory of 3988 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 99 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3536 wrote to memory of 3872 3536 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 100 PID 3872 wrote to memory of 4488 3872 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 101 PID 3872 wrote to memory of 4488 3872 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 101 PID 3872 wrote to memory of 4488 3872 JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe 101 PID 4488 wrote to memory of 2680 4488 Host.exe 104 PID 4488 wrote to memory of 2680 4488 Host.exe 104 PID 4488 wrote to memory of 2680 4488 Host.exe 104 PID 4488 wrote to memory of 2796 4488 Host.exe 106 PID 4488 wrote to memory of 2796 4488 Host.exe 106 PID 4488 wrote to memory of 2796 4488 Host.exe 106 PID 4488 wrote to memory of 716 4488 Host.exe 107 PID 4488 wrote to memory of 716 4488 Host.exe 107 PID 4488 wrote to memory of 716 4488 Host.exe 107 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108 PID 4488 wrote to memory of 3876 4488 Host.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KktdAJzRWbu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFBD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"{path}"2⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0201fb9044d3a3c0f2b1c51ba67175ae.exe"{path}"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KktdAJzRWbu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp74CD.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
PID:2796
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
PID:716
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524421f0e3e9c6ef63b5caa93769e383f
SHA180bee45e39394767b0d6c01030aaf39a2c9e110b
SHA256f735827755a80586b42cac903c95f892e85f535f84694c25d1dc40ec3642e1d5
SHA5124fc9c280399746eec94a12b4e0e2fb294791ffb1f50c51ad90fc9dfa3a9eeea9f0ca7225a4cdd3f8c8cda35a717542baee96583eca9ee24434811785acda9549
-
Filesize
1016KB
MD50201fb9044d3a3c0f2b1c51ba67175ae
SHA1ba81de9830374380eaa3f0b3be47392506ae43b4
SHA2560be83c67ad08f5ae204922c6fd04f6ef7c81525dacb8ad5c9507407b07238f6b
SHA512ee74a332abac5eed298bc5c54a571db2abf05035a722afeae4fe953e45acdc2b3759caf5a28a6751613ed0d154e93a3113d0dacaa51c597d475bc56ee241603e