Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2024, 00:50

General

  • Target

    f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118.exe

  • Size

    538KB

  • MD5

    f0f41a9bda22da851ecafcd69666fb73

  • SHA1

    b5f6dd57b4f77e3ecde6dc863557401696feb6a5

  • SHA256

    5b0d776d373c0195d06e08a7aa9d482d3d0d1f91161fa6a3f02376edd70a2321

  • SHA512

    1ed9deb42d9e28e73b337c83081db26f9e9e985da0e1b00a4f1debfd3b952ea6b94789ec328fdd843e9996458e6db82c970d0f94fd10f92f6f986ecc786ca16d

  • SSDEEP

    12288:werJ+vB8cAkvZo8iFIMPykLDZavM3d5tJaRibByNAlN:+CcAkRZrSwm5tf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Dahia

C2

hajrsehi.ddns.net:1177

Mutex

123899f12e668b238c13e4330d862929

Attributes
  • reg_key

    123899f12e668b238c13e4330d862929

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupFile.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops startup file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -command New-ItemProperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Run' -Name "RegStartup" -Value C:\Users\Admin\AppData\Local\Temp\f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118.exe -PropertyType "String"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2444
    • C:\Users\Admin\AppData\Local\Temp\son.exe
      "C:\Users\Admin\AppData\Local\Temp\son.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\son.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupFile.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops startup file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -command New-ItemProperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Run' -Name "RegStartup" -Value C:\Users\Admin\AppData\Local\Temp\son.exe -PropertyType "String"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1456
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\son.exe" "son.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          5315900105942deb090a358a315b06fe

          SHA1

          22fe5d2e1617c31afbafb91c117508d41ef0ce44

          SHA256

          e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

          SHA512

          77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          d51a0fd68ba96e74c77beb855d2e4b96

          SHA1

          7382812f1702b9f1385ebf61f7802eec35b20f3b

          SHA256

          6d9fe7ff938a0cdfbd7aa71f2d6dba5641fe09d701928e6d93e5799d30de7339

          SHA512

          0abeb982ec2b5292b6b4b1f775f5dcb2b1587dbe3754de83d2f61bfc44c0d113aa5cd8034d8e6bb6e8cca5426e6ffbeeb0a1b47a0b16b61a5c48a9badcbbed81

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          16KB

          MD5

          df10fd076bc5e41b97acec8fc0a7adaf

          SHA1

          45fef9cde3ffca3aca2c0fd871c348fd0ea7df4e

          SHA256

          884c17fbaa1ef70eaaaf88f61138f5e60c776e49615b84bb28fd81505ecc51bb

          SHA512

          8b4154b300e633be13320de0354565ca6d5bb8a8d98cad9e0f016f0f2d2447b294eb4e25f9ff2b9290f5036334d00a7d3e6ec5afe2c66ca855f4aa30ca167212

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          0306475d2e82fd64f5c89400927a3873

          SHA1

          39e44383c008cfbd46504c7447af229cf2b6279a

          SHA256

          497181fd6eba6e15a094faa9e85176699e393c10a5654150994d984f5f76b000

          SHA512

          bb5b234a7d2c93bb8298a6c4c4dcc30bd5f63d8d74a187d3791c5ec47a0107eec3a8caca91951b12ab174fa3de32912e84e2e00ea9e8294973efd3af242eba9a

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p022fynk.qzq.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\son.exe

          Filesize

          538KB

          MD5

          f0f41a9bda22da851ecafcd69666fb73

          SHA1

          b5f6dd57b4f77e3ecde6dc863557401696feb6a5

          SHA256

          5b0d776d373c0195d06e08a7aa9d482d3d0d1f91161fa6a3f02376edd70a2321

          SHA512

          1ed9deb42d9e28e73b337c83081db26f9e9e985da0e1b00a4f1debfd3b952ea6b94789ec328fdd843e9996458e6db82c970d0f94fd10f92f6f986ecc786ca16d

        • memory/1456-89-0x0000000006100000-0x0000000006454000-memory.dmp

          Filesize

          3.3MB

        • memory/2028-28-0x0000000006710000-0x000000000672A000-memory.dmp

          Filesize

          104KB

        • memory/2028-33-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-9-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-10-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-11-0x0000000005340000-0x0000000005968000-memory.dmp

          Filesize

          6.2MB

        • memory/2028-7-0x0000000004C50000-0x0000000004C86000-memory.dmp

          Filesize

          216KB

        • memory/2028-17-0x0000000005AB0000-0x0000000005AD2000-memory.dmp

          Filesize

          136KB

        • memory/2028-22-0x0000000005CD0000-0x0000000005D36000-memory.dmp

          Filesize

          408KB

        • memory/2028-23-0x0000000005D40000-0x0000000005DA6000-memory.dmp

          Filesize

          408KB

        • memory/2028-24-0x0000000005DB0000-0x0000000006104000-memory.dmp

          Filesize

          3.3MB

        • memory/2028-25-0x0000000006230000-0x000000000624E000-memory.dmp

          Filesize

          120KB

        • memory/2028-26-0x0000000006260000-0x00000000062AC000-memory.dmp

          Filesize

          304KB

        • memory/2028-27-0x00000000071F0000-0x0000000007286000-memory.dmp

          Filesize

          600KB

        • memory/2028-8-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2028-29-0x0000000006760000-0x0000000006782000-memory.dmp

          Filesize

          136KB

        • memory/2160-4-0x00000000062E0000-0x0000000006884000-memory.dmp

          Filesize

          5.6MB

        • memory/2160-52-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2160-1-0x0000000000860000-0x00000000008EC000-memory.dmp

          Filesize

          560KB

        • memory/2160-2-0x0000000005310000-0x00000000053AC000-memory.dmp

          Filesize

          624KB

        • memory/2160-3-0x00000000053B0000-0x0000000005426000-memory.dmp

          Filesize

          472KB

        • memory/2160-38-0x0000000005B00000-0x0000000005B0C000-memory.dmp

          Filesize

          48KB

        • memory/2160-5-0x0000000005520000-0x000000000553E000-memory.dmp

          Filesize

          120KB

        • memory/2160-65-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2160-51-0x00000000753BE000-0x00000000753BF000-memory.dmp

          Filesize

          4KB

        • memory/2160-6-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2160-0-0x00000000753BE000-0x00000000753BF000-memory.dmp

          Filesize

          4KB

        • memory/2444-50-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2444-37-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2444-36-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/2444-35-0x00000000753B0000-0x0000000075B60000-memory.dmp

          Filesize

          7.7MB

        • memory/3252-92-0x0000000006630000-0x00000000066C2000-memory.dmp

          Filesize

          584KB

        • memory/3252-93-0x00000000065E0000-0x00000000065EA000-memory.dmp

          Filesize

          40KB

        • memory/4332-75-0x0000000006050000-0x00000000063A4000-memory.dmp

          Filesize

          3.3MB