Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 23:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe
-
Size
1.0MB
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
Malware Config
Extracted
netwire
agencies.duckdns.org:10130
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
travels
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
webmonitor
sanders.wm01.to:443
-
config_key
BvzaT1rL9C6tpOhPi8yqPN03WnzPPc6c
-
private_key
oz5d2fXwy
-
url_path
/recv4.php
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2412-8-0x0000000004FA0000-0x0000000005036000-memory.dmp netwire behavioral2/memory/4208-39-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4208-41-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Netwire family
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 12 IoCs
resource yara_rule behavioral2/memory/3416-43-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-45-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-46-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-47-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-48-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-49-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-50-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-51-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-53-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-54-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-55-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor behavioral2/memory/3416-57-0x0000000000400000-0x00000000004E9000-memory.dmp family_webmonitor -
Webmonitor family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Filename.exe -
Executes dropped EXE 2 IoCs
pid Process 3416 ca718c3cf435c0aeb86e8c0d16721eeb.exe 1580 Filename.exe -
Unexpected DNS network traffic destination 14 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 123.125.81.6 Destination IP 1.2.4.8 Destination IP 139.175.55.244 Destination IP 114.114.114.114 Destination IP 101.226.4.6 Destination IP 89.233.43.71 Destination IP 77.88.8.8 Destination IP 1.2.4.8 Destination IP 101.226.4.6 Destination IP 180.76.76.76 Destination IP 77.88.8.8 Destination IP 91.239.100.100 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DsvHelper\\Filename.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 4208 1580 Filename.exe 87 -
resource yara_rule behavioral2/files/0x000e000000023b6a-13.dat upx behavioral2/memory/3416-17-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-43-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-45-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-46-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-47-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-48-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-49-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-50-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-51-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-53-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-54-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-55-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/3416-57-0x0000000000400000-0x00000000004E9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Filename.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca718c3cf435c0aeb86e8c0d16721eeb.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3416 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 82 PID 2412 wrote to memory of 3416 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 82 PID 2412 wrote to memory of 3416 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 82 PID 2412 wrote to memory of 1580 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 83 PID 2412 wrote to memory of 1580 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 83 PID 2412 wrote to memory of 1580 2412 JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe 83 PID 1580 wrote to memory of 4604 1580 Filename.exe 84 PID 1580 wrote to memory of 4604 1580 Filename.exe 84 PID 1580 wrote to memory of 4604 1580 Filename.exe 84 PID 4604 wrote to memory of 1624 4604 cmd.exe 86 PID 4604 wrote to memory of 1624 4604 cmd.exe 86 PID 4604 wrote to memory of 1624 4604 cmd.exe 86 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87 PID 1580 wrote to memory of 4208 1580 Filename.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d35267608831170c47e95b5f967ca0c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"C:\Users\Admin\AppData\Local\Temp\ca718c3cf435c0aeb86e8c0d16721eeb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3416
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.exe" -n2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DsvHelper\Filename.lnk" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dd65dfa473fde90a9bd6ab724cbf006c
SHA14c146a7fdc77f4f0990cc3f8733e2ecf944f2bd3
SHA256077ad8b2159d696da0c50ea5279220bbbdbd4f2415946336ac531dcba7028b56
SHA5121d5cd1a5e6f5c3bf4e851f9c7d5623aa978e7e0be6e289884bb347fe61a54e5fefee5f9f1f6d89efafdacbb8b7a346b8466cdbafd382123ce173444790a28fd9
-
Filesize
1.0MB
MD57d35267608831170c47e95b5f967ca0c
SHA12896d1e9e30e6734fcaaeef9a3f969ce920e8672
SHA256f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
SHA512b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45