Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 15:37

General

  • Target

    4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe

  • Size

    659KB

  • MD5

    4bcdc27a278c1cec0de3fef56254fba8

  • SHA1

    6ae25705ca1aa619256a0159c3feeec8becadaf4

  • SHA256

    de678f60098dac80ab0716c1f69c4f7c02ce69226b3bf31482d2c4c2d9184096

  • SHA512

    816200ed4669c25072203dfc710747468c800c6de64bcadbe237bbeab8776de110d5ad728f4571af2bde2ab530cd21b71daa2f9d27a5202613460ef2bbf68fcb

  • SSDEEP

    3072:DuKvE9w8UGWfGyO76ePG/P2vHPTjfLnvzbSqPnKjxSvGvm2NvWHfOBaaOqePefCg:Dbv2f2GhNP2GhNIPjG

Malware Config

Extracted

Family

njrat

Version

0.7 MultiHost

Botnet

<<0 @ 0>>

C2

yuotube.myq-see.com:5829

microsoft.serveirc.com:5829

Mutex

ff39ba5283948d2c33635afb7ea5801a

Attributes
  • reg_key

    ff39ba5283948d2c33635afb7ea5801a

  • splitter

    !~@~#~$~%~^~&~!

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4bcdc27a278c1cec0de3fef56254fba8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Bandizip.exe
      "C:\Users\Admin\AppData\Local\Bandizip.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn Skype /tr "C:\Users\Admin\AppData\Local\Bandizip.exe
        3⤵
        • Creates scheduled task(s)
        PID:1200
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7F1E11BD-9128-45EE-811D-B48F1E51D3B2} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Bandizip.exe
      C:\Users\Admin\AppData\Local\Bandizip.exe
      2⤵
      • Executes dropped EXE
      PID:1852
    • C:\Users\Admin\AppData\Local\Bandizip.exe
      C:\Users\Admin\AppData\Local\Bandizip.exe
      2⤵
      • Executes dropped EXE
      PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Bandizip.exe

    Filesize

    659KB

    MD5

    4bcdc27a278c1cec0de3fef56254fba8

    SHA1

    6ae25705ca1aa619256a0159c3feeec8becadaf4

    SHA256

    de678f60098dac80ab0716c1f69c4f7c02ce69226b3bf31482d2c4c2d9184096

    SHA512

    816200ed4669c25072203dfc710747468c800c6de64bcadbe237bbeab8776de110d5ad728f4571af2bde2ab530cd21b71daa2f9d27a5202613460ef2bbf68fcb

  • memory/2468-12-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2468-11-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2468-14-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2468-15-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2468-16-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2468-17-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2884-2-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2884-3-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2884-4-0x000007FEF5B1E000-0x000007FEF5B1F000-memory.dmp

    Filesize

    4KB

  • memory/2884-5-0x0000000000370000-0x000000000037C000-memory.dmp

    Filesize

    48KB

  • memory/2884-1-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2884-13-0x000007FEF5860000-0x000007FEF61FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2884-0-0x000007FEF5B1E000-0x000007FEF5B1F000-memory.dmp

    Filesize

    4KB