Resubmissions

30-09-2024 21:47

240930-1nh3fswgrp 10

30-09-2024 20:16

240930-y16yyaxdmb 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 20:16

General

  • Target

    031b08cf4ccd44e4f2507f47aa49794c_JaffaCakes118.exe

  • Size

    127KB

  • MD5

    031b08cf4ccd44e4f2507f47aa49794c

  • SHA1

    9e38d1e535f2ac77d464c4ecb4da7a6a8321d9a1

  • SHA256

    78812079a5ac503085915fbdd6ff3f3ddbc3dfd2d51883bf381ae8b7b461e6c1

  • SHA512

    328711abffdc66c3e048c66c32b969caf1d996834548d15875176cd9aab9591a012c31504021492ff7fd8ba121f7b91d918ebc355fb4d7efbe1c7cd472b180f3

  • SSDEEP

    3072:U5VoIlMJg61fm9efb02TCA0QojtTlTvIn4xQEpV/RlD:U5Ve+Q2DQoNlb1

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\031b08cf4ccd44e4f2507f47aa49794c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\031b08cf4ccd44e4f2507f47aa49794c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\Uofnjponstiw.exe
      "C:\Users\Admin\AppData\Local\Temp\Uofnjponstiw.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Windows\svchost.exe" "svchost.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2132
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lntdnwewjx.hash
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lntdnwewjx.hash"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Lntdnwewjx.hash

    Filesize

    16B

    MD5

    6b14078dd1b974407f6d07ab56add8cb

    SHA1

    2301764ce6f800147c39f717c9c24a6c14b48caa

    SHA256

    b3f20860803f09634997e9e24e29d09f7b478e724554857fe8699f072904a755

    SHA512

    81596f6e3248d7b0ea8e3baca3b15b3834f2cdac12e44903d98698758da4b50c108f4e0617a198cf6c3b46d237776f86693db529286e1179d4bb3e72e3d6f07e

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    b3a6b5f993f59c2d548b0e4082eef170

    SHA1

    d6d1f385ee42626fe5b3032a9afacb599762fcf6

    SHA256

    50cb8973f2355de6734084c24e06abe17edddd0e7d3177ed9d3565e53f66d835

    SHA512

    84eeda49f1af6d078566fbcd711700b87a6d26da68e0a45ffd6ce9c1dd24537213c482382a025f2fa0f22a0d6b129fc83aa8f54d4b0dc9c729d927ac583ff758

  • \Users\Admin\AppData\Local\Temp\Uofnjponstiw.exe

    Filesize

    158KB

    MD5

    e3edf4dfadaab9c5afc71a7552e9c0d1

    SHA1

    5dd299e6a794f9e306dd975aafe5275c4eae28db

    SHA256

    1cdd10ef166f4e110daf659365dd6ac8f38188c1ec8b6236673bb38efd10f771

    SHA512

    a23204033abd0d1e49a67f848b1536af382fc45885f7d80eeae1e60919bf39606bdcac20e68942b427d57ffaf4164b42b6f3d9479460fdaf1bf0e4a49733b4d6

  • memory/2708-11-0x0000000001E40000-0x0000000001E80000-memory.dmp

    Filesize

    256KB

  • memory/2844-0-0x000000007410E000-0x000000007410F000-memory.dmp

    Filesize

    4KB

  • memory/2844-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2844-2-0x0000000074100000-0x00000000747EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2844-12-0x0000000074100000-0x00000000747EE000-memory.dmp

    Filesize

    6.9MB