Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe
-
Size
659KB
-
MD5
4bcdc27a278c1cec0de3fef56254fba8
-
SHA1
6ae25705ca1aa619256a0159c3feeec8becadaf4
-
SHA256
de678f60098dac80ab0716c1f69c4f7c02ce69226b3bf31482d2c4c2d9184096
-
SHA512
816200ed4669c25072203dfc710747468c800c6de64bcadbe237bbeab8776de110d5ad728f4571af2bde2ab530cd21b71daa2f9d27a5202613460ef2bbf68fcb
-
SSDEEP
3072:DuKvE9w8UGWfGyO76ePG/P2vHPTjfLnvzbSqPnKjxSvGvm2NvWHfOBaaOqePefCg:Dbv2f2GhNP2GhNIPjG
Malware Config
Extracted
njrat
0.7 MultiHost
<<0 @ 0>>
yuotube.myq-see.com:5829
microsoft.serveirc.com:5829
ff39ba5283948d2c33635afb7ea5801a
-
reg_key
ff39ba5283948d2c33635afb7ea5801a
-
splitter
!~@~#~$~%~^~&~!
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2468 Bandizip.exe 1852 Bandizip.exe 2096 Bandizip.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ff39ba5283948d2c33635afb7ea5801a = "\"C:\\Users\\Admin\\AppData\\Local\\Bandizip.exe\" .." Bandizip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ff39ba5283948d2c33635afb7ea5801a = "\"C:\\Users\\Admin\\AppData\\Local\\Bandizip.exe\" .." Bandizip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe Token: 33 2468 Bandizip.exe Token: SeIncBasePriorityPrivilege 2468 Bandizip.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2468 2884 4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2468 2884 4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2468 2884 4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe 30 PID 2468 wrote to memory of 1200 2468 Bandizip.exe 31 PID 2468 wrote to memory of 1200 2468 Bandizip.exe 31 PID 2468 wrote to memory of 1200 2468 Bandizip.exe 31 PID 2948 wrote to memory of 1852 2948 taskeng.exe 34 PID 2948 wrote to memory of 1852 2948 taskeng.exe 34 PID 2948 wrote to memory of 1852 2948 taskeng.exe 34 PID 2948 wrote to memory of 2096 2948 taskeng.exe 35 PID 2948 wrote to memory of 2096 2948 taskeng.exe 35 PID 2948 wrote to memory of 2096 2948 taskeng.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Bandizip.exe"C:\Users\Admin\AppData\Local\Bandizip.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn Skype /tr "C:\Users\Admin\AppData\Local\Bandizip.exe3⤵
- Creates scheduled task(s)
PID:1200
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7F1E11BD-9128-45EE-811D-B48F1E51D3B2} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Bandizip.exeC:\Users\Admin\AppData\Local\Bandizip.exe2⤵
- Executes dropped EXE
PID:1852
-
-
C:\Users\Admin\AppData\Local\Bandizip.exeC:\Users\Admin\AppData\Local\Bandizip.exe2⤵
- Executes dropped EXE
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
659KB
MD54bcdc27a278c1cec0de3fef56254fba8
SHA16ae25705ca1aa619256a0159c3feeec8becadaf4
SHA256de678f60098dac80ab0716c1f69c4f7c02ce69226b3bf31482d2c4c2d9184096
SHA512816200ed4669c25072203dfc710747468c800c6de64bcadbe237bbeab8776de110d5ad728f4571af2bde2ab530cd21b71daa2f9d27a5202613460ef2bbf68fcb