Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
372af030e33e6326192782579c0160dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
372af030e33e6326192782579c0160dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
372af030e33e6326192782579c0160dc_JaffaCakes118.exe
-
Size
69KB
-
MD5
372af030e33e6326192782579c0160dc
-
SHA1
44059731a3fa1e990698fa09935cfa7ab79dca49
-
SHA256
9dcf50d314d9541efbfd3b519fe5bc619478d8fcd116ab21ada07c4da2786088
-
SHA512
cd0aa59c889e9a8933ffda4a33bdf175c318a0c1c3258c88d83a77e2356c06cb5cc7dac7bce03459376a213620caee587061a38e406efe57d520c503ee2d6b8f
-
SSDEEP
1536:cWD1ciNrSVTR1cQHUeq/6YThUoUyPspdA4GSuw1+:vD+JR1cQ0eqCYThU5yPedv+
Malware Config
Extracted
njrat
0.7d
@ HaCkInG By Dr WeSt @
w187.ddns.net:2020
4ef9538b5a577a1bd3c1a578ea50c133
-
reg_key
4ef9538b5a577a1bd3c1a578ea50c133
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2580 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ef9538b5a577a1bd3c1a578ea50c133.exe Windows Audio Device Graph Isolation .exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ef9538b5a577a1bd3c1a578ea50c133.exe Windows Audio Device Graph Isolation .exe -
Executes dropped EXE 2 IoCs
pid Process 2744 [Mr.Abu Hani].exe 2224 Windows Audio Device Graph Isolation .exe -
Loads dropped DLL 4 IoCs
pid Process 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 2744 [Mr.Abu Hani].exe 2744 [Mr.Abu Hani].exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [Mr.Abu Hani].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Audio Device Graph Isolation .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 372af030e33e6326192782579c0160dc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe Token: 33 2224 Windows Audio Device Graph Isolation .exe Token: SeIncBasePriorityPrivilege 2224 Windows Audio Device Graph Isolation .exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2744 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2744 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2744 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2744 3048 372af030e33e6326192782579c0160dc_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2224 2744 [Mr.Abu Hani].exe 31 PID 2744 wrote to memory of 2224 2744 [Mr.Abu Hani].exe 31 PID 2744 wrote to memory of 2224 2744 [Mr.Abu Hani].exe 31 PID 2744 wrote to memory of 2224 2744 [Mr.Abu Hani].exe 31 PID 2224 wrote to memory of 2580 2224 Windows Audio Device Graph Isolation .exe 32 PID 2224 wrote to memory of 2580 2224 Windows Audio Device Graph Isolation .exe 32 PID 2224 wrote to memory of 2580 2224 Windows Audio Device Graph Isolation .exe 32 PID 2224 wrote to memory of 2580 2224 Windows Audio Device Graph Isolation .exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\372af030e33e6326192782579c0160dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\372af030e33e6326192782579c0160dc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\[Mr.Abu Hani].exe"C:\Users\Admin\AppData\Local\Temp\[Mr.Abu Hani].exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe"C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Windows Audio Device Graph Isolation .exe" "Windows Audio Device Graph Isolation .exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD51b6071dc1c6ca35c780dc5dcf5392ba3
SHA1c331def6c09f8c82bc71826b9df035e8fcc5059d
SHA25689a5182594c48407f4588d196d1a22dbed83f4a01023a9e5f6730f5b318ff721
SHA5127b5d03b817025b423d0331a73bd32bb5ec2b5a6fa16bbf40c58695ee193c7dad66187b1574cadd59259799a6c80eabe4031e7d2ea9b22c9333c772d6e4b47c56