Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 11:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe
-
Size
396KB
-
MD5
6c33cc232ababa439e295a455f3980a0
-
SHA1
774365e9521f8087145820b49814d28f37e5c65e
-
SHA256
d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
-
SHA512
48c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347
-
SSDEEP
3072:LBB+77tPHkDLQ2AhPlG/1WBZf7qF/Z2iYmsdxDxUxt6mDLoGrww9JGbtENmszvZ+:Lf+7ODLQ2GEWBZE22lnNlRRP
Malware Config
Extracted
netwire
23.95.88.13:3360
-
activex_autorun
true
-
activex_key
{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}
-
copy_executable
true
-
delete_original
true
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
doctor
-
registry_autorun
true
-
startup_name
system
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/860-3-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/860-5-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/860-11-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4196-22-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Deletes itself 1 IoCs
pid Process 4196 Host.exe -
Executes dropped EXE 2 IoCs
pid Process 2072 Host.exe 4196 Host.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3084 set thread context of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 2072 set thread context of 4196 2072 Host.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 2072 Host.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 3084 wrote to memory of 860 3084 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 82 PID 860 wrote to memory of 2072 860 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 83 PID 860 wrote to memory of 2072 860 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 83 PID 860 wrote to memory of 2072 860 JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe 83 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84 PID 2072 wrote to memory of 4196 2072 Host.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe-m "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c33cc232ababa439e295a455f3980a0.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD56c33cc232ababa439e295a455f3980a0
SHA1774365e9521f8087145820b49814d28f37e5c65e
SHA256d1be6471a46b5d2cae582b6bad0646cc3b59c85df440363a77f2bb41ab553e82
SHA51248c9aa276dc7532766865b3159f5d2c9b9f8cb942060ddc1d311eff8a5d3e8a52fa0ae353975a6ea19625c5e7f9a285602784b3ae8f0b5c50f9bdda19c4ce347