Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 10:28

General

  • Target

    dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe

  • Size

    23KB

  • MD5

    dc3395bc9664f8cf0308634ec11bbd18

  • SHA1

    4f7befb42a13aabf16e8d8aedc539553fb2a95a7

  • SHA256

    a023a728fab1ffb9b35cc8fe79ccb098b32221f7ec85ff8f8ed35e3184134ba5

  • SHA512

    ad22942c728549237510febd6cf8b4a5f8caf5e5db5cf63f348a3591a65d78dad20d073722847485c3605bb06a826bba7ec50867cf65c7d7dd99341c9eb189f2

  • SSDEEP

    384:bweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZSUL:cLq411eRpcnuBO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

anona

C2

anona12345.hopto.org:1177

Mutex

43d2c4a04d4003a3838ff896204e3c44

Attributes
  • reg_key

    43d2c4a04d4003a3838ff896204e3c44

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc3395bc9664f8cf0308634ec11bbd18_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\server
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\server"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server

    Filesize

    23KB

    MD5

    dc3395bc9664f8cf0308634ec11bbd18

    SHA1

    4f7befb42a13aabf16e8d8aedc539553fb2a95a7

    SHA256

    a023a728fab1ffb9b35cc8fe79ccb098b32221f7ec85ff8f8ed35e3184134ba5

    SHA512

    ad22942c728549237510febd6cf8b4a5f8caf5e5db5cf63f348a3591a65d78dad20d073722847485c3605bb06a826bba7ec50867cf65c7d7dd99341c9eb189f2

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8854b4159ce44b86267c6573ab808fd1

    SHA1

    be13647c2b4e8c2d9b1b3a9ca72e9bfe5835ac2b

    SHA256

    e007b0327a66fb1e7120369bfde9ca89753f50438ed44ce7bd2dbdbe65d0fd3c

    SHA512

    c430e99aa380137d43b170729963d6fed67af0240d8aef3f892e78aa57b2204a5cc27e2dfd77b96f946c90ddf2486f8426fe42cdd66e8c74f2512b975b2eaa90

  • memory/2728-0-0x0000000074081000-0x0000000074082000-memory.dmp

    Filesize

    4KB

  • memory/2728-1-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2728-2-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB

  • memory/2728-5-0x0000000074080000-0x000000007462B000-memory.dmp

    Filesize

    5.7MB