Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 05:46
Behavioral task
behavioral1
Sample
JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe
-
Size
687KB
-
MD5
8ec57ed96acbf703ffce25d772b9456b
-
SHA1
dc9b2ad36eca610c4648ad52d748321377c0d089
-
SHA256
aa678a0d186a699538402b004c68a19305ccc364f8d2b74eb07ccec9a0eecd55
-
SHA512
89613cf7e4999d36c27e6e871046cecfd0e81af66e0a3d4a8a28ad870d5ac09e631fb5e5495415472b79ebb779727a1086ffc5038e1a12cfcb71b76f09352a14
-
SSDEEP
12288:DAlwC3XcfrcZ68FCAYNETcGoImVs8J2mQ1+qSJ8l61wfgRyw:cwOkCdYNETcDIj8Q/1+rJAtfF
Malware Config
Extracted
netwire
corected0.duckdns.org:54213
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\FuTrU\Logs\
-
lock_executable
true
-
mutex
ueAtXIon
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2796-18-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/2796-22-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/2796-33-0x0000000000400000-0x0000000000423000-memory.dmp netwire -
Netwire family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpTh = "C:\\Users\\Admin\\AppData\\Roaming\\winup.exe" JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2604 set thread context of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 set thread context of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 -
resource yara_rule behavioral1/memory/2604-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/2252-9-0x0000000000400000-0x000000000059C000-memory.dmp upx behavioral1/memory/2796-14-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2796-16-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2796-17-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2796-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2796-22-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2604-21-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/2252-24-0x0000000000400000-0x000000000059C000-memory.dmp upx behavioral1/memory/2252-27-0x0000000000400000-0x000000000059C000-memory.dmp upx behavioral1/files/0x00080000000120fe-28.dat upx behavioral1/memory/2252-31-0x0000000000400000-0x000000000059C000-memory.dmp upx behavioral1/memory/2796-33-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier csc.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe csc.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier csc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2252 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 30 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32 PID 2604 wrote to memory of 2796 2604 JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ec57ed96acbf703ffce25d772b9456b.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeupx.exe "C:\Users\Admin\AppData\Roaming\winup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD5294aece855726bc21369c795a824be86
SHA1e28d0a96c44f402ec6104eac400e8ea27ea5fa06
SHA256df543009b338861df45e42171f35917468f38515d29f948d59b872c30b853e6a
SHA512a1db601e7813e64425d867f327507fa2cc1a0fa4a0952ba0e41d9bf554d9335eacb8cf1106b565685c4f6d6d1f4512669df8052ce6ad429a3ca04034bff26fee