Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 02:54 UTC

General

  • Target

    0887973431205690d2ddf9623e60d433_JaffaCakes118.exe

  • Size

    475KB

  • MD5

    0887973431205690d2ddf9623e60d433

  • SHA1

    021f27669a96e759555669cd33bbd7804d40dd97

  • SHA256

    954b6db18e2700e7365622598107b9641c0aebc5c3273e9d57d6f09066938e1c

  • SHA512

    3056f4e3816d8f03d3f7333beb5554df0e0fe1d1c46403a3d16ade79a0c5fb22880533a0eedbb693ec18ac6b72068973aa380e0a8bc6eb573ec8af7e2f7b79ef

  • SSDEEP

    6144:+XT0Bg+He5yOkgYkiT2XvvN9xIyDONG28WAC/KoDngLV6yuY1HeO:e0a++Z11DND3+GdO/JDnGVZu0+O

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

New2021-Aug-S1

C2

172.94.14.49:6522

Mutex

db7c7feb5b6d7ffbf13dbb779b6ac342

Attributes
  • reg_key

    db7c7feb5b6d7ffbf13dbb779b6ac342

  • splitter

    Y262SUCZ4UJJ

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe" "0887973431205690d2ddf9623e60d433_JaffaCakes118.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4824

Network

  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    26.165.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.165.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.42.69.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.42.69.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    75.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    75.117.19.2.in-addr.arpa
    IN PTR
    Response
    75.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-75deploystaticakamaitechnologiescom
  • flag-us
    DNS
    48.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    48.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 172.94.14.49:6522
    0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
    260 B
    5
  • 52.111.229.43:443
    322 B
    7
  • 172.94.14.49:6522
    0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
    260 B
    5
  • 172.94.14.49:6522
    0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
    260 B
    5
  • 172.94.14.49:6522
    0887973431205690d2ddf9623e60d433_JaffaCakes118.exe
    208 B
    4
  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    26.165.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    26.165.165.52.in-addr.arpa

  • 8.8.8.8:53
    241.42.69.40.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    241.42.69.40.in-addr.arpa

  • 8.8.8.8:53
    75.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    75.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    48.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    48.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0887973431205690d2ddf9623e60d433_JaffaCakes118.exe.log

    Filesize

    1KB

    MD5

    7ebe314bf617dc3e48b995a6c352740c

    SHA1

    538f643b7b30f9231a3035c448607f767527a870

    SHA256

    48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8

    SHA512

    0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e

  • memory/1100-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/1100-1-0x0000000000700000-0x000000000077E000-memory.dmp

    Filesize

    504KB

  • memory/1100-2-0x0000000005630000-0x0000000005BD4000-memory.dmp

    Filesize

    5.6MB

  • memory/1100-3-0x0000000005120000-0x00000000051B2000-memory.dmp

    Filesize

    584KB

  • memory/1100-4-0x00000000051E0000-0x00000000051EA000-memory.dmp

    Filesize

    40KB

  • memory/1100-5-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-6-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/1100-7-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-8-0x00000000055E0000-0x0000000005630000-memory.dmp

    Filesize

    320KB

  • memory/1100-9-0x0000000006900000-0x0000000006982000-memory.dmp

    Filesize

    520KB

  • memory/1100-17-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-21-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-19-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-71-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-69-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-67-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-63-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-61-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-59-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-55-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-53-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-51-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-47-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-45-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-43-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-39-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-37-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-35-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-33-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-29-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-27-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-25-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-73-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-65-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-57-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-49-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-41-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-31-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-23-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-15-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-13-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-11-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-10-0x0000000006900000-0x000000000697C000-memory.dmp

    Filesize

    496KB

  • memory/1100-2485-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/2080-2484-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/2080-2483-0x0000000005290000-0x000000000532C000-memory.dmp

    Filesize

    624KB

  • memory/2080-2482-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2080-2486-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/2080-2487-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

  • memory/2080-2488-0x0000000074A80000-0x0000000075230000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.