Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
87301351de40852d96930b66553900ac_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87301351de40852d96930b66553900ac_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
87301351de40852d96930b66553900ac_JaffaCakes118.exe
-
Size
648KB
-
MD5
87301351de40852d96930b66553900ac
-
SHA1
cf042b7fb2690e600a360adaf146873dd04c9f9a
-
SHA256
7cdc3aac4fd2cea887b0f9f0c3ef615d470b8dbec055efebce863d7fbf67d797
-
SHA512
616aab7bc673f804c6be6a7a7d521454c3ba895ae0bae5d4cfa5c16c080f29d13ff3315b191c86c2dea0b97462c54336c4b74f49f0ae10e72c4cfaad9f877bdf
-
SSDEEP
12288:2eFxHPvtS8ULd+mQb+mQwWhhhhrE6zTNhhhhhJsni7lhjPyTCp9h7ukziWy9EUKt:2sJPvJULd+mQb+mQwb6hhz9ESiWy9EFt
Malware Config
Extracted
njrat
v2.0
HacKed
62.227.124.106:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 87301351de40852d96930b66553900ac_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Regasm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Regasm.exe -
Executes dropped EXE 2 IoCs
pid Process 2868 stub.exe 2688 Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" Regasm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3876 set thread context of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87301351de40852d96930b66553900ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1752 dw20.exe Token: SeBackupPrivilege 1752 dw20.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3876 wrote to memory of 2868 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 90 PID 3876 wrote to memory of 2868 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 90 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 3876 wrote to memory of 1448 3876 87301351de40852d96930b66553900ac_JaffaCakes118.exe 92 PID 2868 wrote to memory of 1752 2868 stub.exe 93 PID 2868 wrote to memory of 1752 2868 stub.exe 93 PID 1448 wrote to memory of 2688 1448 Regasm.exe 98 PID 1448 wrote to memory of 2688 1448 Regasm.exe 98 PID 1448 wrote to memory of 2688 1448 Regasm.exe 98 PID 1448 wrote to memory of 3368 1448 Regasm.exe 99 PID 1448 wrote to memory of 3368 1448 Regasm.exe 99 PID 1448 wrote to memory of 3368 1448 Regasm.exe 99 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3368 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87301351de40852d96930b66553900ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87301351de40852d96930b66553900ac_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7843⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3368
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
237KB
MD5541a97219a94deaff2f3fad462ccaf0b
SHA1aa76d0a36b0ce118c1bb5d81e4d3ad4cb39c9c12
SHA256a8a01af1b5b629ce9c2866cba6459fc05052b77d70f3a93012ecc69e4ed209d6
SHA512d18bf28d9b817c144ba5e9184a3f6d256ab990eb1b90b6be9a77b8edab158ab6e8b3b8047adb28385b5859474433b5270d29b9ef3389ed5b009ef0255d00d581