Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 23:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
-
Size
1.0MB
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
Malware Config
Extracted
netwire
agencies.duckdns.org:10130
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
travels
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
webmonitor
sanders.wm01.to:443
-
config_key
BvzaT1rL9C6tpOhPi8yqPN03WnzPPc6c
-
private_key
oz5d2fXwy
-
url_path
/recv4.php
Signatures
-
NetWire RAT payload 7 IoCs
resource yara_rule behavioral1/memory/2344-3-0x0000000004530000-0x00000000045C6000-memory.dmp netwire behavioral1/memory/2344-13-0x0000000004F10000-0x0000000004FF9000-memory.dmp netwire behavioral1/memory/1644-47-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1644-50-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1644-45-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1644-43-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1644-51-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Netwire family
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 10 IoCs
resource yara_rule behavioral1/memory/2376-52-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-54-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-56-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-57-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-58-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-59-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-60-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-62-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-64-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral1/memory/2376-66-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor -
Webmonitor family
-
Executes dropped EXE 2 IoCs
pid Process 2376 ca718c3cf435c0aeb86e8c0d16721eeb.exe 2784 Filename.exe -
Loads dropped DLL 5 IoCs
pid Process 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 2784 Filename.exe -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 89.233.43.71 Destination IP 101.226.4.6 Destination IP 1.2.4.8 Destination IP 123.125.81.6 Destination IP 77.88.8.8 Destination IP 180.76.76.76 Destination IP 139.175.55.244 Destination IP 91.239.100.100 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DsvHelper\\Filename.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 1644 2784 Filename.exe 37 -
resource yara_rule behavioral1/files/0x0008000000016d3e-12.dat upx behavioral1/memory/2376-15-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-52-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-54-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-56-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-57-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-58-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-59-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-60-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-62-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-64-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral1/memory/2376-66-0x0000000000400000-0x00000000004E9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Filename.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2376 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 31 PID 2344 wrote to memory of 2376 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 31 PID 2344 wrote to memory of 2376 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 31 PID 2344 wrote to memory of 2376 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 31 PID 2344 wrote to memory of 2784 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 32 PID 2344 wrote to memory of 2784 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 32 PID 2344 wrote to memory of 2784 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 32 PID 2344 wrote to memory of 2784 2344 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 32 PID 2784 wrote to memory of 2804 2784 Filename.exe 33 PID 2784 wrote to memory of 2804 2784 Filename.exe 33 PID 2784 wrote to memory of 2804 2784 Filename.exe 33 PID 2784 wrote to memory of 2804 2784 Filename.exe 33 PID 2804 wrote to memory of 2640 2804 cmd.exe 35 PID 2804 wrote to memory of 2640 2804 cmd.exe 35 PID 2804 wrote to memory of 2640 2804 cmd.exe 35 PID 2804 wrote to memory of 2640 2804 cmd.exe 35 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37 PID 2784 wrote to memory of 1644 2784 Filename.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"2⤵
- Executes dropped EXE
PID:2376
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe" -n2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dd65dfa473fde90a9bd6ab724cbf006c
SHA14c146a7fdc77f4f0990cc3f8733e2ecf944f2bd3
SHA256077ad8b2159d696da0c50ea5279220bbbdbd4f2415946336ac531dcba7028b56
SHA5121d5cd1a5e6f5c3bf4e851f9c7d5623aa978e7e0be6e289884bb347fe61a54e5fefee5f9f1f6d89efafdacbb8b7a346b8466cdbafd382123ce173444790a28fd9
-
Filesize
1.0MB
MD57d35267608831170c47e95b5f967ca0c
SHA12896d1e9e30e6734fcaaeef9a3f969ce920e8672
SHA256f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
SHA512b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45