Analysis

  • max time kernel
    135s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 02:55

General

  • Target

    c61c339a984de868ae12a1061e8d3610_JaffaCakes118.exe

  • Size

    25KB

  • MD5

    c61c339a984de868ae12a1061e8d3610

  • SHA1

    56ccbfc8b6f9a01dc55113d3e3b3e80b9058e6eb

  • SHA256

    7f0eb032a323c7d431d8d65b6b9ebfa6a43bb69a6c33199c750fef5310227348

  • SHA512

    a082698d693afa3ddb0764b8867f11387dfb59f07438db78084ac137ca656d81b9f6f5f252b10ea6b66a2691e68aac86b0c6842798eeaf3e52a92090605862f0

  • SSDEEP

    768:svpZsBPgtvfUwHJGyYFu9wqfU/Xd+LWysNh:Qi1gNUKwyPRMF+Sh

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

109.62.136.78:1604

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61c339a984de868ae12a1061e8d3610_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c61c339a984de868ae12a1061e8d3610_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    PID:4100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4100-0-0x00007FF989723000-0x00007FF989725000-memory.dmp

    Filesize

    8KB

  • memory/4100-1-0x0000000000550000-0x0000000000558000-memory.dmp

    Filesize

    32KB

  • memory/4100-2-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/4100-3-0x00007FF989720000-0x00007FF98A1E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4100-5-0x00007FF989720000-0x00007FF98A1E1000-memory.dmp

    Filesize

    10.8MB