Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 10:28
Behavioral task
behavioral1
Sample
dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe
-
Size
23KB
-
MD5
dc3395bc9664f8cf0308634ec11bbd18
-
SHA1
4f7befb42a13aabf16e8d8aedc539553fb2a95a7
-
SHA256
a023a728fab1ffb9b35cc8fe79ccb098b32221f7ec85ff8f8ed35e3184134ba5
-
SHA512
ad22942c728549237510febd6cf8b4a5f8caf5e5db5cf63f348a3591a65d78dad20d073722847485c3605bb06a826bba7ec50867cf65c7d7dd99341c9eb189f2
-
SSDEEP
384:bweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZSUL:cLq411eRpcnuBO
Malware Config
Extracted
njrat
0.7d
anona
anona12345.hopto.org:1177
43d2c4a04d4003a3838ff896204e3c44
-
reg_key
43d2c4a04d4003a3838ff896204e3c44
-
splitter
|'|'|
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2400 2728 dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2740 2400 rundll32.exe 31 PID 2400 wrote to memory of 2740 2400 rundll32.exe 31 PID 2400 wrote to memory of 2740 2400 rundll32.exe 31 PID 2400 wrote to memory of 2740 2400 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\server2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\server"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5dc3395bc9664f8cf0308634ec11bbd18
SHA14f7befb42a13aabf16e8d8aedc539553fb2a95a7
SHA256a023a728fab1ffb9b35cc8fe79ccb098b32221f7ec85ff8f8ed35e3184134ba5
SHA512ad22942c728549237510febd6cf8b4a5f8caf5e5db5cf63f348a3591a65d78dad20d073722847485c3605bb06a826bba7ec50867cf65c7d7dd99341c9eb189f2
-
Filesize
3KB
MD58854b4159ce44b86267c6573ab808fd1
SHA1be13647c2b4e8c2d9b1b3a9ca72e9bfe5835ac2b
SHA256e007b0327a66fb1e7120369bfde9ca89753f50438ed44ce7bd2dbdbe65d0fd3c
SHA512c430e99aa380137d43b170729963d6fed67af0240d8aef3f892e78aa57b2204a5cc27e2dfd77b96f946c90ddf2486f8426fe42cdd66e8c74f2512b975b2eaa90