Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 08:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe
-
Size
950KB
-
MD5
63c2605da147dd996cf67dbab271ecd0
-
SHA1
7f58a8a3e59348a62a7cc2260aa3b3e9fb2c7de6
-
SHA256
1315a24934797f7bcacf88f31146fe7bb40646e3febe9b5548db14d1e9af6270
-
SHA512
0e7aee9cc9a193c7457f0dc1a4470f3b6ec414f5506e8a7f778af5b442720cb8c1f568b028ce118cc69ad52e4152f7738b0a32079bbbe3372a1dde4357642cef
-
SSDEEP
24576:EwfOoOVRYnqdlSOHtInpmrYPBQ5vMQvS1wUb:Ewmo2YnqdlSOKpmrYPB2vM4mw
Malware Config
Extracted
njrat
0.6.4
Victime by achreef
0523.no-ip.biz:1543
1522a860fc4f8a79b71476fd27d96fe9
-
reg_key
1522a860fc4f8a79b71476fd27d96fe9
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1164 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 hutmen.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1522a860fc4f8a79b71476fd27d96fe9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\hutmen.exe\" .." hutmen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1522a860fc4f8a79b71476fd27d96fe9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\hutmen.exe\" .." hutmen.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe 2604 hutmen.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 hutmen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2604 4528 JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe 83 PID 4528 wrote to memory of 2604 4528 JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe 83 PID 2604 wrote to memory of 1164 2604 hutmen.exe 84 PID 2604 wrote to memory of 1164 2604 hutmen.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63c2605da147dd996cf67dbab271ecd0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\hutmen.exe"C:\Users\Admin\AppData\Local\Temp\hutmen.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\hutmen.exe" "hutmen.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
950KB
MD563c2605da147dd996cf67dbab271ecd0
SHA17f58a8a3e59348a62a7cc2260aa3b3e9fb2c7de6
SHA2561315a24934797f7bcacf88f31146fe7bb40646e3febe9b5548db14d1e9af6270
SHA5120e7aee9cc9a193c7457f0dc1a4470f3b6ec414f5506e8a7f778af5b442720cb8c1f568b028ce118cc69ad52e4152f7738b0a32079bbbe3372a1dde4357642cef