Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 20:48
Behavioral task
behavioral1
Sample
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe
-
Size
27KB
-
MD5
8053e8d64be8f8296c3dbd269c0aba41
-
SHA1
f7063edbe53d30fef2b228b3fe15a243cd39e358
-
SHA256
8667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894
-
SHA512
bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa
-
SSDEEP
384:QLRQKJ3buZjmgERA40DwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcaJ:O2K5buQE40fLFA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
HacKed
185.195.232.248:54977
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Drops startup file 4 IoCs
Processes:
Payload.exe8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe -
Executes dropped EXE 1 IoCs
Processes:
Payload.exepid Process 2112 Payload.exe -
Loads dropped DLL 1 IoCs
Processes:
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exepid Process 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Payload.exe8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exePayload.exeattrib.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
Payload.exedescription pid Process Token: SeDebugPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe Token: 33 2112 Payload.exe Token: SeIncBasePriorityPrivilege 2112 Payload.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exedescription pid Process procid_target PID 1960 wrote to memory of 2112 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2112 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2112 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2112 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2756 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 32 PID 1960 wrote to memory of 2756 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 32 PID 1960 wrote to memory of 2756 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 32 PID 1960 wrote to memory of 2756 1960 8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5175dcf91ef523df6166fc091918c8841
SHA1e07af27597a939af81039147f404680d28f33850
SHA25678be10b7e3783e797bfff8f3f5dcaab17d0612c508dd9259b046f8dab5cb89de
SHA5126de78d023e2fb500944d7cbe2995b91bf98c54f97e8b36cefae5458c3c6e7b68eea3e3e746777bfad62d59b069bd3143d07f3c8d90dedb0d6eccd90fb8c79378
-
Filesize
1022B
MD52003bb0332ddfd3d91153db0bd88564e
SHA132e60a8379db536b5037a7bf909289960369582b
SHA256b3fd92b0ef90b98cb7d9ed6435266f9d8e364054038ce8490bd0d005ef144517
SHA512be63a85396b5c4deefebd891c5997785708a27bcc6a95b3221328be4711b9315c57966de43503bec3a58c674238ce57aa401f6afcdcb4d66e9b5723c465b28d7
-
Filesize
27KB
MD58053e8d64be8f8296c3dbd269c0aba41
SHA1f7063edbe53d30fef2b228b3fe15a243cd39e358
SHA2568667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894
SHA512bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa