Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 15:51
Behavioral task
behavioral1
Sample
f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe
-
Size
93KB
-
MD5
f29a2274931e575fad1687f2e13be0cc
-
SHA1
48e19b444fedb0313590e2f976c4c74f612d5222
-
SHA256
3d027d9488ecc9b42321a91d0ab62f558b415418ade114024d158def747041d5
-
SHA512
2c34f0f4c0582b5f272ed0803e5e9982bbfc7a8cb1587ec36e9b4af453540ffd8d1a1286e3fc2a70a90270e0f890bbcc08251d3fe12dff09b4f8e90c0208c17e
-
SSDEEP
1536:Gw4Ec0HCYnz7a5MzU/jEwzGi1dDgDpgS:GwZHCYnzQMzUEi1dem
Malware Config
Extracted
njrat
0.7d
Hacked
hakim32.ddns.net:2000
127.0.0.1:5552
933b50ceb66c61e2d1f00d0728b5a5f8
-
reg_key
933b50ceb66c61e2d1f00d0728b5a5f8
-
splitter
|'|'|
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2188 netsh.exe 2612 netsh.exe 2664 netsh.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\933b50ceb66c61e2d1f00d0728b5a5f8Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\933b50ceb66c61e2d1f00d0728b5a5f8Windows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\.exe server.exe File opened for modification C:\Windows\SysWOW64\.exe server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\.exe server.exe File opened for modification C:\Program Files (x86)\.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe 2540 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 server.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe Token: 33 2540 server.exe Token: SeIncBasePriorityPrivilege 2540 server.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2540 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2540 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2540 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2540 2292 f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2188 2540 server.exe 32 PID 2540 wrote to memory of 2188 2540 server.exe 32 PID 2540 wrote to memory of 2188 2540 server.exe 32 PID 2540 wrote to memory of 2188 2540 server.exe 32 PID 2540 wrote to memory of 2612 2540 server.exe 34 PID 2540 wrote to memory of 2612 2540 server.exe 34 PID 2540 wrote to memory of 2612 2540 server.exe 34 PID 2540 wrote to memory of 2612 2540 server.exe 34 PID 2540 wrote to memory of 2664 2540 server.exe 35 PID 2540 wrote to memory of 2664 2540 server.exe 35 PID 2540 wrote to memory of 2664 2540 server.exe 35 PID 2540 wrote to memory of 2664 2540 server.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f29a2274931e575fad1687f2e13be0cc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\ProgramData\server.exe"C:\ProgramData\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\ProgramData\server.exe"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5c2844bc9e1bd64168a727b0680ae4d90
SHA17bb263540de557f5a4e09c6c78b7dbb314a0df9a
SHA2569c9701ab918368b615fc6a0dbeb5efa286a232d751982ae70b48ad6914bf01e5
SHA512360953bb20d91539022fcb1becf4638970c4452816797a8dca65e3ae4a542302e6e89f0828087caaa63a0750aa78605f8034da7c8663fa4fc677c8f3e53655ed
-
Filesize
93KB
MD5f29a2274931e575fad1687f2e13be0cc
SHA148e19b444fedb0313590e2f976c4c74f612d5222
SHA2563d027d9488ecc9b42321a91d0ab62f558b415418ade114024d158def747041d5
SHA5122c34f0f4c0582b5f272ed0803e5e9982bbfc7a8cb1587ec36e9b4af453540ffd8d1a1286e3fc2a70a90270e0f890bbcc08251d3fe12dff09b4f8e90c0208c17e