Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 11:09
Behavioral task
behavioral1
Sample
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
-
Size
37KB
-
MD5
bb9d4ebcc754a7e6cb7536b735d85fdf
-
SHA1
62a93b979c2634af2b39520df73249747bbed84c
-
SHA256
850072b510695bd8649daad557e371b869054361e888d1aa4ffa51cf8e8c7c87
-
SHA512
e727a8e987da902339c6ceef93e163fedaa8a0a03c5e0784ac919653f0428f8723ebab7d232cef80bd1337956254c4333fba500ee85fdfdc2a80884822e48363
-
SSDEEP
384:gUG23hUidkGXR21cGMy8Pqq53tGFlymZErAF+rMRTyN/0L+EcoinblneHQM3epzs:JG23ZLGv8Pqq58im+rM+rMRa8NuFgt
Malware Config
Extracted
njrat
im523
HacKed
miop.ddns.net:2280
18df5afc301de09badbb5fa494c2daf3
-
reg_key
18df5afc301de09badbb5fa494c2daf3
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2484 netsh.exe -
Drops startup file 2 IoCs
Processes:
server5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18df5afc301de09badbb5fa494c2daf3.exe server5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18df5afc301de09badbb5fa494c2daf3.exe server5.exe -
Executes dropped EXE 1 IoCs
Processes:
server5.exepid process 2616 server5.exe -
Loads dropped DLL 1 IoCs
Processes:
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exepid process 1924 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
server5.exedescription pid process Token: SeDebugPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe Token: 33 2616 server5.exe Token: SeIncBasePriorityPrivilege 2616 server5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exeserver5.exedescription pid process target process PID 1924 wrote to memory of 2616 1924 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 1924 wrote to memory of 2616 1924 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 1924 wrote to memory of 2616 1924 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 1924 wrote to memory of 2616 1924 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 2616 wrote to memory of 2484 2616 server5.exe netsh.exe PID 2616 wrote to memory of 2484 2616 server5.exe netsh.exe PID 2616 wrote to memory of 2484 2616 server5.exe netsh.exe PID 2616 wrote to memory of 2484 2616 server5.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server5.exe"C:\Users\Admin\AppData\Local\Temp\server5.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server5.exe" "server5.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\server5.exeFilesize
37KB
MD5bb9d4ebcc754a7e6cb7536b735d85fdf
SHA162a93b979c2634af2b39520df73249747bbed84c
SHA256850072b510695bd8649daad557e371b869054361e888d1aa4ffa51cf8e8c7c87
SHA512e727a8e987da902339c6ceef93e163fedaa8a0a03c5e0784ac919653f0428f8723ebab7d232cef80bd1337956254c4333fba500ee85fdfdc2a80884822e48363
-
memory/1924-0-0x00000000741B1000-0x00000000741B2000-memory.dmpFilesize
4KB
-
memory/1924-1-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/1924-2-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/1924-10-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/2616-13-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/2616-12-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/2616-11-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB
-
memory/2616-15-0x00000000741B0000-0x000000007475B000-memory.dmpFilesize
5.7MB