Analysis

  • max time kernel
    147s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-06-2024 18:05

General

  • Target

    034daff5b443407c84a4bc639d5e19f2_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    034daff5b443407c84a4bc639d5e19f2

  • SHA1

    eea87cc11f2f8ddd422582d84de58171d02153d6

  • SHA256

    f780170cbcc07326cda96e3cd8364b2a28251c63888b0e5f1df98d8112994e08

  • SHA512

    0d94ad8d4b4e9225efbec70894317ecbc73b65dff13094d9cdbd26140ef888fe7f929562402ccad49ed716c6b6f8ec3123e5dc7046f5b3f62a0ac243014a8da6

  • SSDEEP

    384:chVohFaXjzJG3ePklL4Q+LRTS4MFI6/1L6w2DFikpcCRu9L1wwAf4J7FWbuHf5eh:cXOazk3kT8mk1H1hwB

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

B HAT

Mutex

f9da7cbb82fc486c908ea82600db03cb

Attributes
  • reg_key

    f9da7cbb82fc486c908ea82600db03cb

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034daff5b443407c84a4bc639d5e19f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\034daff5b443407c84a4bc639d5e19f2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4860-0-0x00007FF917E75000-0x00007FF917E76000-memory.dmp

    Filesize

    4KB

  • memory/4860-1-0x000000001BB30000-0x000000001BBD6000-memory.dmp

    Filesize

    664KB

  • memory/4860-2-0x00007FF917BC0000-0x00007FF918561000-memory.dmp

    Filesize

    9.6MB

  • memory/4860-3-0x000000001BC00000-0x000000001BC0C000-memory.dmp

    Filesize

    48KB

  • memory/4860-4-0x00007FF917BC0000-0x00007FF918561000-memory.dmp

    Filesize

    9.6MB

  • memory/4860-5-0x000000001C870000-0x000000001CD3E000-memory.dmp

    Filesize

    4.8MB

  • memory/4860-6-0x000000001BE20000-0x000000001BEBC000-memory.dmp

    Filesize

    624KB

  • memory/4860-7-0x000000001BBE0000-0x000000001BBE8000-memory.dmp

    Filesize

    32KB

  • memory/4860-8-0x00007FF917E75000-0x00007FF917E76000-memory.dmp

    Filesize

    4KB

  • memory/4860-9-0x00007FF917BC0000-0x00007FF918561000-memory.dmp

    Filesize

    9.6MB