Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 16:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe
-
Size
64KB
-
MD5
5c85732bd87cf170c6940bd4295205bd
-
SHA1
87c80fa08f90298bdbeaba072bfa865fec4ad32b
-
SHA256
ff712e3125edb1fff53504f41688b0199bbd1826c070d0e01a709466f18ff463
-
SHA512
3c97f0439d1f3ab19e03d07503bc01ebe8b3a6ed54866ab509ff9a1027efee359eb16520091555c3672a28056e38ed78a67d90829659d68d94692ccd6a18f62d
-
SSDEEP
768:ADJ7/Ypg+5uP3F1aRbISeFWvsiKPs942U5NDjRtynWUYq160PRgCZApW4p8wj5J:ADFQcSUmvsrsu5NZYnWCjFd4iwj3
Malware Config
Extracted
njrat
0.7d
HacKed
doosh1.ddns.net:1177
85512046f02e2e40ac8b7817ba607078
-
reg_key
85512046f02e2e40ac8b7817ba607078
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3328 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe Token: 33 2444 Update.exe Token: SeIncBasePriorityPrivilege 2444 Update.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2444 1420 JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe 89 PID 1420 wrote to memory of 2444 1420 JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe 89 PID 1420 wrote to memory of 2444 1420 JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe 89 PID 2444 wrote to memory of 3328 2444 Update.exe 96 PID 2444 wrote to memory of 3328 2444 Update.exe 96 PID 2444 wrote to memory of 3328 2444 Update.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c85732bd87cf170c6940bd4295205bd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\Update.exe"C:\Users\Admin\AppData\Roaming\Update.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Update.exe" "Update.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3328
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55c85732bd87cf170c6940bd4295205bd
SHA187c80fa08f90298bdbeaba072bfa865fec4ad32b
SHA256ff712e3125edb1fff53504f41688b0199bbd1826c070d0e01a709466f18ff463
SHA5123c97f0439d1f3ab19e03d07503bc01ebe8b3a6ed54866ab509ff9a1027efee359eb16520091555c3672a28056e38ed78a67d90829659d68d94692ccd6a18f62d