Malware Analysis Report

2024-10-23 20:47

Sample ID 240528-wvc3kaef6z
Target 7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118
SHA256 7efda24c1ee3ff88c0c9207592e5cdd7dcc47e7a143fddacbbc00e83075ccbf3
Tags
njrat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7efda24c1ee3ff88c0c9207592e5cdd7dcc47e7a143fddacbbc00e83075ccbf3

Threat Level: Known bad

The file 7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

njrat trojan

njRAT/Bladabindi

Suspicious use of SetThreadContext

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-28 18:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 18:14

Reported

2024-05-28 18:16

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3980 set thread context of 628 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 137.71.91.104.in-addr.arpa udp
US 173.225.115.127:1194 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 173.225.115.127:1194 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 173.225.115.127:1194 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 173.225.115.127:1194 tcp
US 173.225.115.127:1194 tcp

Files

memory/3980-0-0x000000007482E000-0x000000007482F000-memory.dmp

memory/3980-1-0x0000000000380000-0x00000000003AE000-memory.dmp

memory/3980-2-0x0000000005200000-0x00000000057A4000-memory.dmp

memory/3980-3-0x0000000004D50000-0x0000000004DE2000-memory.dmp

memory/3980-4-0x0000000005950000-0x00000000059EC000-memory.dmp

memory/3980-5-0x000000007482E000-0x000000007482F000-memory.dmp

memory/628-6-0x0000000000400000-0x000000000040C000-memory.dmp

memory/628-8-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/628-9-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/628-10-0x0000000005220000-0x000000000522A000-memory.dmp

memory/628-11-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/628-12-0x0000000074770000-0x0000000074F20000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 18:14

Reported

2024-05-28 18:16

Platform

win7-20240221-en

Max time kernel

147s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2228 set thread context of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: 33 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2228 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7de82cf4039e12d08e53f15f760e69bf_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

Network

Country Destination Domain Proto
US 173.225.115.127:1194 tcp
US 173.225.115.127:1194 tcp
US 173.225.115.127:1194 tcp
US 173.225.115.127:1194 tcp

Files

memory/2228-0-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

memory/2228-1-0x0000000000EC0000-0x0000000000EEE000-memory.dmp

memory/2228-2-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

memory/1264-3-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-6-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-9-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1264-5-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-4-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-11-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1264-13-0x0000000000400000-0x000000000040C000-memory.dmp