Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 11:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe
-
Size
396KB
-
MD5
6c33cc232ababa439e295a455f3980a0
-
SHA1
774365e9521f8087145820b49814d28f37e5c65e
-
SHA256
d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
-
SHA512
48c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347
-
SSDEEP
3072:LBB+77tPHkDLQ2AhPlG/1WBZf7qF/Z2iYmsdxDxUxt6mDLoGrww9JGbtENmszvZ+:Lf+7ODLQ2GEWBZE22lnNlRRP
Malware Config
Extracted
netwire
23.95.88.13:3360
-
activex_autorun
true
-
activex_key
{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
doctor
-
registry_autorun
true
-
startup_name
system
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2084-3-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2084-5-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2084-7-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2340-26-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2340-29-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Deletes itself 1 IoCs
pid Process 2340 Host.exe -
Executes dropped EXE 2 IoCs
pid Process 1484 Host.exe 2340 Host.exe -
Loads dropped DLL 3 IoCs
pid Process 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 1484 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2372 set thread context of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 1484 set thread context of 2340 1484 Host.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 1484 Host.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2372 wrote to memory of 2084 2372 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 30 PID 2084 wrote to memory of 1484 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 31 PID 2084 wrote to memory of 1484 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 31 PID 2084 wrote to memory of 1484 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 31 PID 2084 wrote to memory of 1484 2084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 31 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32 PID 1484 wrote to memory of 2340 1484 Host.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD56c33cc232ababa439e295a455f3980a0
SHA1774365e9521f8087145820b49814d28f37e5c65e
SHA256d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
SHA51248c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347