Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 12:04

General

  • Target

    efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe

  • Size

    27.6MB

  • MD5

    efc0cbb158d388b5d778f876b7bf63ef

  • SHA1

    a4a0f15afeb62a68917dfc4f0d974b0d69ccdaaa

  • SHA256

    39a33f73741118aa05511c1524ad3da573d7fe94a929cc0660c7719a13d335b0

  • SHA512

    14db18dc1ba4a22369090726cbb932c642b7711135aa0279f038b94a09e53041b09482e5a098dfa450813ebb1df0c75fe3615452118398010e5d3a0a1873f432

  • SSDEEP

    786432:CvYUcHwRXkRVTSAfvQftVmv9lMPKosqJ4:LPQRXAVfyr+lhHl

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\Tool qM6wr Private v1.exe
      "C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\Tool qM6wr Private v1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3028
    • C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\llk2.exe
      "C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\llk2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\Adobe\Updates\MetroFramework.dll

          Filesize

          133KB

          MD5

          a3a380676711eac89f67e0043c21b5d6

          SHA1

          587c765dc3ca8d3ea2fa55b9f227cef284287522

          SHA256

          c23cdacb0de78c5c6e8a1dde085cca1bf8261d3b90dac39379a4ac4518d212d1

          SHA512

          98a8a6741fce19d7817e412d0d2fbe772d8fbda527a3f3a56ddce8dec0bcd23c6e0755402ad816af089f50fdd7b33bd8d834f3af6beb85dbff53830b5c130697

        • \Users\Admin\AppData\Local\Temp\Adobe\Updates\PS3Lib.dll

          Filesize

          475KB

          MD5

          e2591c9be92cd8f098027885306833aa

          SHA1

          99f4bef5ab9d4034cfa5e4d3f2eba83c8038eba4

          SHA256

          f7e015454587c29aff65c82569e629955eb5e52a3a85b4f3677f9f1bc8ab7500

          SHA512

          68c55f8d07d1aa15f8216b2c2c7512cb88d4f92666295a8a84db46b30ac40cb6c4e774650bf41885aff31cc8d49709a05eb5dde2503864354d9c8b0e57f375b6

        • \Users\Admin\AppData\Local\Temp\Adobe\Updates\Tool qM6wr Private v1.exe

          Filesize

          28.9MB

          MD5

          90ca79ee599a1b09eb943920f3082c20

          SHA1

          0cc10d064322b98adcd51dad213c19d4f9098b15

          SHA256

          fa61d4fd3f67c8d1683a5690cf4b7a32aa45bb972fb72a16f8e8795fba9b408b

          SHA512

          2d8a6705416d83636210aa5995c4da698aa236657a3362f3ae0cb5a769a0fd952105d4e5925c7f8996a3bad9e157c128ee3cb8714470f51e72c9d7616122f204

        • \Users\Admin\AppData\Local\Temp\Adobe\Updates\llk2.exe

          Filesize

          197KB

          MD5

          0e0cfb1529bbf556f107967c4ebae5ee

          SHA1

          c8764f32d617224951c191d8a7624cb6f4a6fc35

          SHA256

          2b838fa014c5dc66cc5f787ec57d6ea89b2700a70d60644e721fcb68d9df4b69

          SHA512

          f4194d0d117674be83e0ba29a9bd49292f744f68ba839697fe98c23d1244839c6e83a8ceadcfd0db43ff997af4879ec692620e7c0ca976516315e456a29bc185

        • memory/2524-33-0x0000000074680000-0x0000000074D6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2524-17-0x0000000001100000-0x0000000001138000-memory.dmp

          Filesize

          224KB

        • memory/2524-31-0x0000000000530000-0x000000000053C000-memory.dmp

          Filesize

          48KB

        • memory/2524-19-0x0000000074680000-0x0000000074D6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2524-29-0x0000000074680000-0x0000000074D6E000-memory.dmp

          Filesize

          6.9MB

        • memory/3028-27-0x0000000000C90000-0x0000000000D10000-memory.dmp

          Filesize

          512KB

        • memory/3028-23-0x00000000001F0000-0x0000000000218000-memory.dmp

          Filesize

          160KB

        • memory/3028-28-0x0000000000260000-0x000000000026A000-memory.dmp

          Filesize

          40KB

        • memory/3028-30-0x0000000074680000-0x0000000074D6E000-memory.dmp

          Filesize

          6.9MB

        • memory/3028-18-0x0000000000FA0000-0x0000000002C92000-memory.dmp

          Filesize

          28.9MB

        • memory/3028-32-0x000000007468E000-0x000000007468F000-memory.dmp

          Filesize

          4KB

        • memory/3028-16-0x000000007468E000-0x000000007468F000-memory.dmp

          Filesize

          4KB

        • memory/3028-34-0x0000000074680000-0x0000000074D6E000-memory.dmp

          Filesize

          6.9MB