General
-
Target
6658e474113c5241f9ad3b32ad7e6228_JaffaCakes118
-
Size
520KB
-
Sample
240522-hgc9hsfd6y
-
MD5
6658e474113c5241f9ad3b32ad7e6228
-
SHA1
4466ee86ddafd15f05f6312e929f4875ebb25996
-
SHA256
14396a942f7a0b580e799d6c15e281150a6c7f25a30a917bf445388058665f9e
-
SHA512
d941d727aa4ef18a2661406ec75c1a54e65e308db90f95f10136aa6cf49286a8e37a7892bcde439282bc85b2da862834ef128ffe79d55da7cd8df0735c63c130
-
SSDEEP
3072:7V/gcQgdWMlHEINo3vXbrFXIUyLu+n2SyTvcnrLi2DQXf:+JNMiI6fL5IBLu+D/e2Qf
Static task
static1
Behavioral task
behavioral1
Sample
6658e474113c5241f9ad3b32ad7e6228_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6658e474113c5241f9ad3b32ad7e6228_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
VICTIME
med78520.no-ip.org:1604
191da080f1cb6252fab9081030369fa6
-
reg_key
191da080f1cb6252fab9081030369fa6
-
splitter
|'|'|
Targets
-
-
Target
6658e474113c5241f9ad3b32ad7e6228_JaffaCakes118
-
Size
520KB
-
MD5
6658e474113c5241f9ad3b32ad7e6228
-
SHA1
4466ee86ddafd15f05f6312e929f4875ebb25996
-
SHA256
14396a942f7a0b580e799d6c15e281150a6c7f25a30a917bf445388058665f9e
-
SHA512
d941d727aa4ef18a2661406ec75c1a54e65e308db90f95f10136aa6cf49286a8e37a7892bcde439282bc85b2da862834ef128ffe79d55da7cd8df0735c63c130
-
SSDEEP
3072:7V/gcQgdWMlHEINo3vXbrFXIUyLu+n2SyTvcnrLi2DQXf:+JNMiI6fL5IBLu+D/e2Qf
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1