Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 23:45
Behavioral task
behavioral1
Sample
6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe
-
Size
31KB
-
MD5
6cad475c6e8c9139055b3bdf3d716113
-
SHA1
346ce2065899cc85fa1f752f8c88a45891f8c95d
-
SHA256
22c4762706b5affeb8e1b88a68616d42d72ef851def63908561a4ddb3b4914b4
-
SHA512
a592568b64a85ebe5818459237464fa9f646455c3a53a8cdae906e6ee1190b178369d1b4b157f01d806333d5577544f15a3c01598b94405b798c11619b205e41
-
SSDEEP
768:i/0JRmRzj+zxJ+hyAscnhTXv6woQmIDUu0tiFmj:fMa0jD3oQVk9j
Malware Config
Extracted
njrat
0.7d
MyBot
192.168.0.108:6522
7004a169caddc15ac96f95a3f349997f
-
reg_key
7004a169caddc15ac96f95a3f349997f
-
splitter
Y262SUCZ4UJJ
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1048 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
sex.exepid process 2888 sex.exe -
Loads dropped DLL 1 IoCs
Processes:
6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exepid process 1976 6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
sex.exedescription pid process Token: SeDebugPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe Token: 33 2888 sex.exe Token: SeIncBasePriorityPrivilege 2888 sex.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exesex.exedescription pid process target process PID 1976 wrote to memory of 2888 1976 6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe sex.exe PID 1976 wrote to memory of 2888 1976 6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe sex.exe PID 1976 wrote to memory of 2888 1976 6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe sex.exe PID 1976 wrote to memory of 2888 1976 6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe sex.exe PID 2888 wrote to memory of 1048 2888 sex.exe netsh.exe PID 2888 wrote to memory of 1048 2888 sex.exe netsh.exe PID 2888 wrote to memory of 1048 2888 sex.exe netsh.exe PID 2888 wrote to memory of 1048 2888 sex.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6cad475c6e8c9139055b3bdf3d716113_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sex.exe"C:\Users\Admin\AppData\Local\Temp\sex.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\sex.exe" "sex.exe" ENABLE3⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\sex.exeFilesize
31KB
MD56cad475c6e8c9139055b3bdf3d716113
SHA1346ce2065899cc85fa1f752f8c88a45891f8c95d
SHA25622c4762706b5affeb8e1b88a68616d42d72ef851def63908561a4ddb3b4914b4
SHA512a592568b64a85ebe5818459237464fa9f646455c3a53a8cdae906e6ee1190b178369d1b4b157f01d806333d5577544f15a3c01598b94405b798c11619b205e41
-
memory/1976-0-0x0000000074151000-0x0000000074152000-memory.dmpFilesize
4KB
-
memory/1976-1-0x0000000074150000-0x00000000746FB000-memory.dmpFilesize
5.7MB
-
memory/1976-2-0x0000000074150000-0x00000000746FB000-memory.dmpFilesize
5.7MB
-
memory/1976-10-0x0000000074150000-0x00000000746FB000-memory.dmpFilesize
5.7MB
-
memory/2888-11-0x0000000074150000-0x00000000746FB000-memory.dmpFilesize
5.7MB
-
memory/2888-12-0x0000000074150000-0x00000000746FB000-memory.dmpFilesize
5.7MB