Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-10-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe
-
Size
84KB
-
MD5
753c707e47bce65d32be781ea1584e0b
-
SHA1
7b43f6a910b01553dfae51560570365e3ce9ed42
-
SHA256
b1c0e35f47273a236518f43ee56c0367d8b423ca9ed8f9e7ad4a875caa47bb69
-
SHA512
8afc2ebbc80e17e42317202e9479e0c223456cf9f0b22ccdf9fe486eff19ebf9a33a2e00c01aa81168d4ad9950c34c8d78dc2f5821702fe61874221088d3cdda
-
SSDEEP
1536:2ppfa5dJy8Cgrw7rPNDwhucaDlZ5gb0HI//4gQF0eCaL:3yIwmhuDlZWbcO4/waL
Malware Config
Extracted
njrat
0.7d
NYAN CAT
narotomagic.publicvm.com:6663
a728eeadc9774101a351e2a5b3fe9598
-
reg_key
a728eeadc9774101a351e2a5b3fe9598
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2636 primt.exe 2188 primt.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\primt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\primt.exe\"" 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 268 set thread context of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 2636 set thread context of 2188 2636 primt.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language primt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe Token: SeDebugPrivilege 2636 primt.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 268 wrote to memory of 2316 268 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2636 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2636 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2636 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2636 2316 753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe 33 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34 PID 2636 wrote to memory of 2188 2636 primt.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\primt.exe"C:\Users\Admin\AppData\Roaming\primt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\primt.exeC:\Users\Admin\AppData\Roaming\primt.exe4⤵
- Executes dropped EXE
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48.9MB
MD5da56e6548cf6e6fd3df1a28304e420df
SHA1dccf5ff05e5b65848fab0d8f19359dbab48ce1d6
SHA2566f1cbf553bfc6761183254fdaaf58746dad1aab8a663bf141e893933fa3fa8e6
SHA5127ef2184568596d3c566b246ec1b78956280b923ab1655207a9480e4732fb60df329bbfc6d4fa21bbc8ec0059a9b99b298472fab3f33741df707a42c81fb46c0d