Analysis
-
max time kernel
148s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe
-
Size
365KB
-
MD5
4292b1f50c211aa1c13bdcef3c4e9da1
-
SHA1
3e38c11ceb88c46782aa7398b7849bb50dfc07da
-
SHA256
806f81c2a9821e0a0b2112278eaa13a615360f5ec39bcdcab635bcb9a4fcebe7
-
SHA512
230545c6c44469b0620121fd3f3dbd4d63251545ad7522394666edd1b62f08e25fa58277e6c64b05d70782c0100f7f54b457bc65f5f99a87a1c3191a026e7013
-
SSDEEP
6144:OYVD4r0bVGfpk2LRWEQVRySTZBH/YXAHczKELLvaYkIGnm9fXBWyUHJVSrm:JVD4r0hwrcEQVRySVN/YX8cmOyVIGapK
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
ЙЬ@@%#TI3LjAuЙЬ@@%#C4x:��<
f9c9cdacdb545863782da2b421f859d0
-
reg_key
f9c9cdacdb545863782da2b421f859d0
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3452 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation Windows Store.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.url 4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Store.url Windows Store.exe -
Executes dropped EXE 1 IoCs
pid Process 4412 Windows Store.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 4464 4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe Token: SeDebugPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe Token: 33 4412 Windows Store.exe Token: SeIncBasePriorityPrivilege 4412 Windows Store.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4412 4464 4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe 85 PID 4464 wrote to memory of 4412 4464 4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe 85 PID 4412 wrote to memory of 2632 4412 Windows Store.exe 87 PID 4412 wrote to memory of 2632 4412 Windows Store.exe 87 PID 4412 wrote to memory of 3452 4412 Windows Store.exe 89 PID 4412 wrote to memory of 3452 4412 Windows Store.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4292b1f50c211aa1c13bdcef3c4e9da1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\Settings\Windows Store.exe"C:\Users\Admin\AppData\Roaming\Settings\Windows Store.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Windows Store" /tr "'C:\Users\Admin\AppData\Roaming\Settings\Windows Store.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Settings\Windows Store.exe" "Windows Store.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3452
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD54292b1f50c211aa1c13bdcef3c4e9da1
SHA13e38c11ceb88c46782aa7398b7849bb50dfc07da
SHA256806f81c2a9821e0a0b2112278eaa13a615360f5ec39bcdcab635bcb9a4fcebe7
SHA512230545c6c44469b0620121fd3f3dbd4d63251545ad7522394666edd1b62f08e25fa58277e6c64b05d70782c0100f7f54b457bc65f5f99a87a1c3191a026e7013