General
-
Target
1453dea35bb0999da71915c5f67aa02f_JaffaCakes118
-
Size
31KB
-
Sample
240504-y4kj4sdb93
-
MD5
1453dea35bb0999da71915c5f67aa02f
-
SHA1
bea0bc17d93324afe2de3125e749d32cfc93d62e
-
SHA256
34fce5dfe31c71df306d1928ee1b230c1fcd6e405372b86c805d55decae90cf6
-
SHA512
45fbf4def048becdf047d13f079f618b804a37bc6183f49c6a147254e43ec70caf699cd5ab686d23c5f1fd213c2eb950b8ceb3f4110f9465a092ea4aade53b87
-
SSDEEP
768:/5bSzG1XB9Qzxry13IPf4bxvy/QmIDUu0tiusj:km6ixoQVkaj
Behavioral task
behavioral1
Sample
1453dea35bb0999da71915c5f67aa02f_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1453dea35bb0999da71915c5f67aa02f_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
njrat
0.7d
AimWhTrigger
192.168.1.106:1234
8800635067c4e3ff3eb68b999162adf3
-
reg_key
8800635067c4e3ff3eb68b999162adf3
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
1453dea35bb0999da71915c5f67aa02f_JaffaCakes118
-
Size
31KB
-
MD5
1453dea35bb0999da71915c5f67aa02f
-
SHA1
bea0bc17d93324afe2de3125e749d32cfc93d62e
-
SHA256
34fce5dfe31c71df306d1928ee1b230c1fcd6e405372b86c805d55decae90cf6
-
SHA512
45fbf4def048becdf047d13f079f618b804a37bc6183f49c6a147254e43ec70caf699cd5ab686d23c5f1fd213c2eb950b8ceb3f4110f9465a092ea4aade53b87
-
SSDEEP
768:/5bSzG1XB9Qzxry13IPf4bxvy/QmIDUu0tiusj:km6ixoQVkaj
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1