Analysis

  • max time kernel
    16s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 19:11

General

  • Target

    87301351de40852d96930b66553900ac_JaffaCakes118.exe

  • Size

    648KB

  • MD5

    87301351de40852d96930b66553900ac

  • SHA1

    cf042b7fb2690e600a360adaf146873dd04c9f9a

  • SHA256

    7cdc3aac4fd2cea887b0f9f0c3ef615d470b8dbec055efebce863d7fbf67d797

  • SHA512

    616aab7bc673f804c6be6a7a7d521454c3ba895ae0bae5d4cfa5c16c080f29d13ff3315b191c86c2dea0b97462c54336c4b74f49f0ae10e72c4cfaad9f877bdf

  • SSDEEP

    12288:2eFxHPvtS8ULd+mQb+mQwWhhhhrE6zTNhhhhhJsni7lhjPyTCp9h7ukziWy9EUKt:2sJPvJULd+mQb+mQwb6hhz9ESiWy9EFt

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

62.227.124.106:5552

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87301351de40852d96930b66553900ac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\87301351de40852d96930b66553900ac_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\stub.exe
      "C:\Users\Admin\AppData\Local\Temp\stub.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 396
        3⤵
          PID:1628
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"
        2⤵
          PID:2100
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"
          2⤵
          • Drops startup file
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Users\Admin\AppData\Local\Temp\Payload.exe
            "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2616
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\Payload.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • \Users\Admin\AppData\Local\Temp\stub.exe

        Filesize

        237KB

        MD5

        541a97219a94deaff2f3fad462ccaf0b

        SHA1

        aa76d0a36b0ce118c1bb5d81e4d3ad4cb39c9c12

        SHA256

        a8a01af1b5b629ce9c2866cba6459fc05052b77d70f3a93012ecc69e4ed209d6

        SHA512

        d18bf28d9b817c144ba5e9184a3f6d256ab990eb1b90b6be9a77b8edab158ab6e8b3b8047adb28385b5859474433b5270d29b9ef3389ed5b009ef0255d00d581

      • memory/2244-8-0x000007FEF594E000-0x000007FEF594F000-memory.dmp

        Filesize

        4KB

      • memory/2244-10-0x000007FEF5690000-0x000007FEF602D000-memory.dmp

        Filesize

        9.6MB

      • memory/2244-24-0x000007FEF594E000-0x000007FEF594F000-memory.dmp

        Filesize

        4KB

      • memory/2244-28-0x000007FEF5690000-0x000007FEF602D000-memory.dmp

        Filesize

        9.6MB

      • memory/2540-11-0x0000000004760000-0x00000000047A0000-memory.dmp

        Filesize

        256KB

      • memory/2540-1-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2540-9-0x0000000004EC0000-0x0000000004ED8000-memory.dmp

        Filesize

        96KB

      • memory/2540-0-0x0000000073C4E000-0x0000000073C4F000-memory.dmp

        Filesize

        4KB

      • memory/2616-36-0x0000000000250000-0x0000000000262000-memory.dmp

        Filesize

        72KB

      • memory/2820-22-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-14-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-12-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-16-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-18-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2820-21-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB

      • memory/2820-23-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB