Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
5a23daf9b3b5cc63cb1bc05554f08939
-
SHA1
1c5da1257668d249397f3fc678ac922623d4740d
-
SHA256
0435c7a496eac28db6f3af5ae859064cf133e7bda1ef44080d8a6bad1eade671
-
SHA512
b8816d67f0ee1a1ba298314e76257f362e04fcf15cbc048a11bd98b85829f8b508f7d5cc51713c6e1f2a4eb4274995b8cee3f836dccd575af75ef92ae23bb53a
-
SSDEEP
49152:D8iSTZdXTZdHXTZdXTZaqLd+mQb+mQ7hdDaQ7SAs:D
Malware Config
Extracted
njrat
v2.0
HacKed
62.227.124.106:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Executes dropped EXE 5 IoCs
pid Process 2808 stub.exe 2272 Payload.exe 1608 Payload.exe 2040 stub.exe 2872 Payload.exe -
Loads dropped DLL 5 IoCs
pid Process 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 2272 Payload.exe 1608 Payload.exe 1608 Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2192 set thread context of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2932 set thread context of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2272 set thread context of 1608 2272 Payload.exe 37 PID 1608 set thread context of 2872 1608 Payload.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe Token: 33 2872 Payload.exe Token: SeIncBasePriorityPrivilege 2872 Payload.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2808 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2808 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2932 2192 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2628 2808 stub.exe 32 PID 2808 wrote to memory of 2628 2808 stub.exe 32 PID 2808 wrote to memory of 2628 2808 stub.exe 32 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 2932 wrote to memory of 1688 2932 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 33 PID 1688 wrote to memory of 2272 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 34 PID 1688 wrote to memory of 2272 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 34 PID 1688 wrote to memory of 2272 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 34 PID 1688 wrote to memory of 2272 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 34 PID 1688 wrote to memory of 2220 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 35 PID 1688 wrote to memory of 2220 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 35 PID 1688 wrote to memory of 2220 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 35 PID 1688 wrote to memory of 2220 1688 5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe 35 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 2272 wrote to memory of 1608 2272 Payload.exe 37 PID 1608 wrote to memory of 2040 1608 Payload.exe 38 PID 1608 wrote to memory of 2040 1608 Payload.exe 38 PID 1608 wrote to memory of 2040 1608 Payload.exe 38 PID 1608 wrote to memory of 2040 1608 Payload.exe 38 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 1608 wrote to memory of 2872 1608 Payload.exe 39 PID 2040 wrote to memory of 1720 2040 stub.exe 40 PID 2040 wrote to memory of 1720 2040 stub.exe 40 PID 2040 wrote to memory of 1720 2040 stub.exe 40 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2220 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 3963⤵PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe"3⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4007⤵PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"6⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2220
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5483f86727c45f8708ef5c52cf2ffb202
SHA14a8f1f974de6dc5a4b0d061d31f99e066e274a6e
SHA25638d64461d94b76bfc989857b1e7d90ec6b739aacd5ee97b5510a7851c4623fdd
SHA5127cfe13eb4ba6ebf5a5bd871b9f0ae66c43a8fc31ca175442c76199b28cbf6f3e3ef726dbc01c358ce8a9512c3f0888b0574174b4883decfd5a054523b1519f21
-
Filesize
1022B
MD545a6f40ede1d1b1750641d01aebbbc36
SHA17b032f59ca7967d5bc7017c09cb7fe5199ea1f77
SHA25686c6167b81bcb992c2e403308e53a7d801a3b7b2cbc1245d47704074c5004238
SHA512686969179d56b400a781c5a0a29e60b9802503755df7613a350f19a128b5a6705c44448a8c18ec13bdaf1229b82217a9d11ecd541b48f301a609435f045270c1
-
Filesize
1.6MB
MD55a23daf9b3b5cc63cb1bc05554f08939
SHA11c5da1257668d249397f3fc678ac922623d4740d
SHA2560435c7a496eac28db6f3af5ae859064cf133e7bda1ef44080d8a6bad1eade671
SHA512b8816d67f0ee1a1ba298314e76257f362e04fcf15cbc048a11bd98b85829f8b508f7d5cc51713c6e1f2a4eb4274995b8cee3f836dccd575af75ef92ae23bb53a
-
Filesize
237KB
MD5541a97219a94deaff2f3fad462ccaf0b
SHA1aa76d0a36b0ce118c1bb5d81e4d3ad4cb39c9c12
SHA256a8a01af1b5b629ce9c2866cba6459fc05052b77d70f3a93012ecc69e4ed209d6
SHA512d18bf28d9b817c144ba5e9184a3f6d256ab990eb1b90b6be9a77b8edab158ab6e8b3b8047adb28385b5859474433b5270d29b9ef3389ed5b009ef0255d00d581