Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe
-
Size
96KB
-
MD5
ae13d7f110850b45a19e2a7d5002a160
-
SHA1
5061d81b42d592e44fc763b806b3e28d09613e99
-
SHA256
38e3d61fa81efc013d30939def97d7592e0dbb16e1057153c5e661843b587503
-
SHA512
f392e39d037468b8ee55de702ea3596925b96342b7670a182c975a85b99d7e26c8aeb2921a5f3e378881e1fd5f798a1ebf39e1375791857cc664a70233d2a110
-
SSDEEP
1536:8/LZ8cCVzTK9Ol93Lh5C0tew6cZuL5HTc8Jti8vqjqitwL12:898xTdllPCWb6SuL5Hg8Jti8vWqitwL4
Malware Config
Extracted
njrat
0.7d
P2P작업
jin98816.kro.kr:3
809b6ef4fe234529ad0cd3a9dc9c84f6
-
reg_key
809b6ef4fe234529ad0cd3a9dc9c84f6
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1480 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\809b6ef4fe234529ad0cd3a9dc9c84f6.exe dasHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\809b6ef4fe234529ad0cd3a9dc9c84f6.exe dasHost.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 dasHost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\809b6ef4fe234529ad0cd3a9dc9c84f6 = "\"C:\\Users\\Admin\\dasHost.exe\" .." dasHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\809b6ef4fe234529ad0cd3a9dc9c84f6 = "\"C:\\Users\\Admin\\dasHost.exe\" .." dasHost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe File opened for modification C:\Windows\assembly ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe Token: 33 2108 dasHost.exe Token: SeIncBasePriorityPrivilege 2108 dasHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3412 wrote to memory of 2108 3412 ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe 86 PID 3412 wrote to memory of 2108 3412 ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe 86 PID 2108 wrote to memory of 1480 2108 dasHost.exe 90 PID 2108 wrote to memory of 1480 2108 dasHost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae13d7f110850b45a19e2a7d5002a160_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\dasHost.exe"C:\Users\Admin\dasHost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\dasHost.exe" "dasHost.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1480
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ae13d7f110850b45a19e2a7d5002a160
SHA15061d81b42d592e44fc763b806b3e28d09613e99
SHA25638e3d61fa81efc013d30939def97d7592e0dbb16e1057153c5e661843b587503
SHA512f392e39d037468b8ee55de702ea3596925b96342b7670a182c975a85b99d7e26c8aeb2921a5f3e378881e1fd5f798a1ebf39e1375791857cc664a70233d2a110