Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe
-
Size
105KB
-
MD5
ee9a3f216d02117e0e5a13bac187a6d7
-
SHA1
5aef391069c557df0e985e7e7ce3e3834d1a69dc
-
SHA256
9bac3c48258cdeeca5a5c67b241ebe2a498133da6eee1b7e3fa55f3bbb758bd9
-
SHA512
6fd5a7596bd2f2a1823b005db5d7ffa4d1cc8c833ed7b219fd733764f63ba72c997fc8523b4e2cefea54a0939f116211707c872ad6c83b053e93dbefe2404227
-
SSDEEP
1536:njcKXqDDW8SJhGCiPALSGHm9+nWTqADchnOtt/2GmLhnD9d/XRiA+Vc4OT2lQ:jcwH+P/8Et4qN9mrd/Xn+Vc4OT2lQ
Malware Config
Extracted
njrat
0.7d
HacKed
127.5.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4640 175.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings 175.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4268 wrote to memory of 4640 4268 ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe 83 PID 4268 wrote to memory of 4640 4268 ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\175.exeC:\Users\Admin\AppData\Local\Temp\175.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:4640
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5dfe7a9e6769176c36f6f89293199732b
SHA11191af31154f51ac43f6a09b39013ea6bf89546d
SHA256f66adacf4155c865a319e330f3b9e00d5729458a87ed4937e4ec95a662176fdc
SHA512b3c6fe2eb0a694197995c34870e7ffd2e70be56dbbfa5e75ae7993e3eb0b0141c201b03f9b2a8702015e666e43e0f5a0a25bcf3c53d4baa79d69a63966725aaa