Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 00:53
Behavioral task
behavioral1
Sample
37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe
-
Size
501KB
-
MD5
37a8ee92838e77cf667250cedd0cecf8
-
SHA1
1c63553822af742ee07fb27865c51b54b74f1a27
-
SHA256
a1912487964fbfa6a9004a0889bde004a7b3d007e98706b79688bbb6229af557
-
SHA512
d943bcfccfa3710a6c311dfb4f13325a1fb39f77392897928e196b07d4c2209aa44e959d9b265530a7c0adfdf87db9950997d729b9811c541c2ff531f69e115c
-
SSDEEP
6144:JdwYPCCUKFZbWo5xCQ70ThcE6f7fAwHLDjWoGhX1rvw:ZFfyEAqAp
Malware Config
Extracted
njrat
0.7d
HacKed
imfares.ddns.net:9090
doza122.con-ip.com:5552
21010c58298d9aa69d2fa375e98ef354
-
reg_key
21010c58298d9aa69d2fa375e98ef354
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2848 netsh.exe 1608 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\84398377c5556d3df54a82be74cfa960.exe midia.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\84398377c5556d3df54a82be74cfa960.exe midia.exe -
Executes dropped EXE 4 IoCs
pid Process 2340 Server.exe 2900 ss.exe 2964 windowsdefender.exe 1712 midia.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 Server.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\21010c58298d9aa69d2fa375e98ef354 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ss.exe\" .." ss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21010c58298d9aa69d2fa375e98ef354 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ss.exe\" .." ss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\84398377c5556d3df54a82be74cfa960 = "\"C:\\Users\\Admin\\AppData\\Roaming\\midia.exe\" .." midia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84398377c5556d3df54a82be74cfa960 = "\"C:\\Users\\Admin\\AppData\\Roaming\\midia.exe\" .." midia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2900 ss.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: SeDebugPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe Token: 33 2900 ss.exe Token: SeIncBasePriorityPrivilege 2900 ss.exe Token: 33 1712 midia.exe Token: SeIncBasePriorityPrivilege 1712 midia.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2340 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2340 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2340 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2340 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 30 PID 2340 wrote to memory of 2900 2340 Server.exe 31 PID 2340 wrote to memory of 2900 2340 Server.exe 31 PID 2340 wrote to memory of 2900 2340 Server.exe 31 PID 2340 wrote to memory of 2900 2340 Server.exe 31 PID 3060 wrote to memory of 2964 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2964 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2964 3060 37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe 32 PID 2900 wrote to memory of 2848 2900 ss.exe 33 PID 2900 wrote to memory of 2848 2900 ss.exe 33 PID 2900 wrote to memory of 2848 2900 ss.exe 33 PID 2900 wrote to memory of 2848 2900 ss.exe 33 PID 2964 wrote to memory of 1712 2964 windowsdefender.exe 35 PID 2964 wrote to memory of 1712 2964 windowsdefender.exe 35 PID 2964 wrote to memory of 1712 2964 windowsdefender.exe 35 PID 1712 wrote to memory of 1608 1712 midia.exe 36 PID 1712 wrote to memory of 1608 1712 midia.exe 36 PID 1712 wrote to memory of 1608 1712 midia.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\ss.exe"C:\Users\Admin\AppData\Local\Temp\ss.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\ss.exe" "ss.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\windowsdefender.exe"C:\Users\Admin\AppData\Local\Temp\windowsdefender.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\midia.exe"C:\Users\Admin\AppData\Roaming\midia.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\midia.exe" "midia.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5cdbb79508d72203c58609d91d047e301
SHA17393e8ff013e34d5f6dd25f826a65a93e35c4187
SHA25657ccaf6d672e35215ba32b6591bc0a28bfeade9b5bf8b70afa5b9d2ba7346e3f
SHA51292a126b7b128ecc30256ac0e4482b5d74b5182371874271f032c9cf61d526f26830999310ee0970ed735660f50cba73b4ba9847a140f0f329cf5fd8fe26a994e
-
Filesize
455KB
MD5af290b8ff78113678bd4828d9e446ad6
SHA168581f15f701792ef96e95bbfce8b072648b9a70
SHA2567cbea2906a3099a25b10fd3019a29a5b0f811181e99615dac59c807ff38f6a7a
SHA5129d895d28271bf392b0294eff8af6415a9d31683c848515ea1079f5612ea807ade6e22e58fe7bc3636a3238c68e2e0aaae49505629cecc02d7eb14eaddd456f05