Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
-
Size
443KB
-
MD5
7d9bb96b136079089c40410575d02edb
-
SHA1
189f477ab2fd0129254543c1b141b9c2b38a138b
-
SHA256
f3287a6edd21a00a2b5c85cdf0dd9917567dea86fc2eed207f2fa63e19d7b27f
-
SHA512
ce82415b7fc877a2cb1485fa7f4caf1ed01daf07ce062b18736cef3fad93e256c4a8da282a10c2805e8615e587b479f3de13099d217457324df24a2d534060ad
-
SSDEEP
12288:pmPZVKvYtrdi9aDZSmlTb9blmRWwK/gH6quir:0PiqZkoTlf9dgHfuir
Malware Config
Extracted
netwire
chriswork999.ddns.net:3366
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
19032020
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2608-8-0x0000000000400000-0x0000000000430000-memory.dmp netwire behavioral1/memory/2608-12-0x0000000000400000-0x0000000000430000-memory.dmp netwire behavioral1/memory/2608-13-0x0000000000400000-0x0000000000430000-memory.dmp netwire -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\HkmdR = "C:\\GHPZRGFC\\HkmdRv\\HkmdRvqvl.vbs" 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription pid process target process PID 2740 set thread context of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exepid process 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription pid process target process PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 2740 wrote to memory of 2608 2740 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2608-8-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2608-12-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2608-13-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2740-0-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/2740-1-0x0000000000B40000-0x0000000000BB4000-memory.dmpFilesize
464KB
-
memory/2740-2-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2740-3-0x0000000000710000-0x0000000000748000-memory.dmpFilesize
224KB
-
memory/2740-4-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/2740-5-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2740-10-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2740-11-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB