Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe
-
Size
443KB
-
MD5
7d9bb96b136079089c40410575d02edb
-
SHA1
189f477ab2fd0129254543c1b141b9c2b38a138b
-
SHA256
f3287a6edd21a00a2b5c85cdf0dd9917567dea86fc2eed207f2fa63e19d7b27f
-
SHA512
ce82415b7fc877a2cb1485fa7f4caf1ed01daf07ce062b18736cef3fad93e256c4a8da282a10c2805e8615e587b479f3de13099d217457324df24a2d534060ad
-
SSDEEP
12288:pmPZVKvYtrdi9aDZSmlTb9blmRWwK/gH6quir:0PiqZkoTlf9dgHfuir
Malware Config
Extracted
netwire
chriswork999.ddns.net:3366
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
19032020
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4620-9-0x0000000000400000-0x0000000000430000-memory.dmp netwire behavioral2/memory/4620-13-0x0000000000400000-0x0000000000430000-memory.dmp netwire behavioral2/memory/4620-15-0x0000000000400000-0x0000000000430000-memory.dmp netwire -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HkmdR = "C:\\OAILVCNY\\HkmdRv\\HkmdRvqvl.vbs" 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription pid process target process PID 452 set thread context of 4620 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exepid process 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7d9bb96b136079089c40410575d02edb_JaffaCakes118.exedescription pid process target process PID 452 wrote to memory of 4620 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 452 wrote to memory of 4620 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 452 wrote to memory of 4620 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe PID 452 wrote to memory of 4620 452 7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d9bb96b136079089c40410575d02edb_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe"2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4456 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/452-0-0x00000000747DE000-0x00000000747DF000-memory.dmpFilesize
4KB
-
memory/452-1-0x0000000000C90000-0x0000000000D04000-memory.dmpFilesize
464KB
-
memory/452-2-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/452-3-0x00000000030C0000-0x00000000030F8000-memory.dmpFilesize
224KB
-
memory/452-4-0x0000000005D20000-0x00000000062C4000-memory.dmpFilesize
5.6MB
-
memory/452-5-0x00000000747DE000-0x00000000747DF000-memory.dmpFilesize
4KB
-
memory/452-6-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/452-11-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/452-14-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/4620-9-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4620-13-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4620-15-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB