Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 21:10

General

  • Target

    JaffaCakes118_68438c308d130716f80aa9a021662850.exe

  • Size

    219KB

  • MD5

    68438c308d130716f80aa9a021662850

  • SHA1

    add2d84c1bd330c0823956c6b854bd415794d2e2

  • SHA256

    c8ebfb28d731a5327defd33eea31b84ae3ccc939d0aff668f5c6d5548573e3f0

  • SHA512

    f06152825a78e46997b5c24f1fb8c98c185b727806adb2b5882283c97cf23a30f9e996bd4c21990e1ab73902f377e9612ab4615e0a884ba7960a9f84b60c0506

  • SSDEEP

    6144:8GTcQZLy3VvDGmgeF0YPR7E8It4QyWVXvRsQnj5/:8GTOFNp544Qn/eQF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hackerbmx.ddns.net:2880

Mutex

cc57968da41b2265f09489d6547c830c

Attributes
  • reg_key

    cc57968da41b2265f09489d6547c830c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68438c308d130716f80aa9a021662850.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68438c308d130716f80aa9a021662850.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\serverx.exe
      "C:\Users\Admin\AppData\Local\Temp\serverx.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SYSTEM32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\serverx.exe" "serverx.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\serverx.exe

    Filesize

    219KB

    MD5

    68438c308d130716f80aa9a021662850

    SHA1

    add2d84c1bd330c0823956c6b854bd415794d2e2

    SHA256

    c8ebfb28d731a5327defd33eea31b84ae3ccc939d0aff668f5c6d5548573e3f0

    SHA512

    f06152825a78e46997b5c24f1fb8c98c185b727806adb2b5882283c97cf23a30f9e996bd4c21990e1ab73902f377e9612ab4615e0a884ba7960a9f84b60c0506

  • memory/3388-30-0x000000001BE80000-0x000000001BE8E000-memory.dmp

    Filesize

    56KB

  • memory/3388-10-0x000000001BC60000-0x000000001BC8E000-memory.dmp

    Filesize

    184KB

  • memory/3388-3-0x00000000030C0000-0x00000000030FA000-memory.dmp

    Filesize

    232KB

  • memory/3388-8-0x000000001BBD0000-0x000000001BC00000-memory.dmp

    Filesize

    192KB

  • memory/3388-7-0x000000001BBA0000-0x000000001BBD2000-memory.dmp

    Filesize

    200KB

  • memory/3388-6-0x000000001BB70000-0x000000001BBA4000-memory.dmp

    Filesize

    208KB

  • memory/3388-16-0x000000001BD40000-0x000000001BD62000-memory.dmp

    Filesize

    136KB

  • memory/3388-4-0x0000000003210000-0x0000000003248000-memory.dmp

    Filesize

    224KB

  • memory/3388-17-0x000000001BD60000-0x000000001BD80000-memory.dmp

    Filesize

    128KB

  • memory/3388-24-0x00000000018B0000-0x00000000018C6000-memory.dmp

    Filesize

    88KB

  • memory/3388-23-0x000000001BE20000-0x000000001BE38000-memory.dmp

    Filesize

    96KB

  • memory/3388-22-0x000000001BE00000-0x000000001BE1A000-memory.dmp

    Filesize

    104KB

  • memory/3388-21-0x000000001BDE0000-0x000000001BDFC000-memory.dmp

    Filesize

    112KB

  • memory/3388-20-0x000000001BDC0000-0x000000001BDDE000-memory.dmp

    Filesize

    120KB

  • memory/3388-19-0x000000001BDA0000-0x000000001BDC0000-memory.dmp

    Filesize

    128KB

  • memory/3388-18-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3388-26-0x000000001BE40000-0x000000001BE52000-memory.dmp

    Filesize

    72KB

  • memory/3388-29-0x000000001BE70000-0x000000001BE7E000-memory.dmp

    Filesize

    56KB

  • memory/3388-5-0x000000001BB40000-0x000000001BB76000-memory.dmp

    Filesize

    216KB

  • memory/3388-0-0x00007FFD47823000-0x00007FFD47825000-memory.dmp

    Filesize

    8KB

  • memory/3388-25-0x000000001BD80000-0x000000001BD94000-memory.dmp

    Filesize

    80KB

  • memory/3388-28-0x000000001BE60000-0x000000001BE70000-memory.dmp

    Filesize

    64KB

  • memory/3388-27-0x000000001BE50000-0x000000001BE62000-memory.dmp

    Filesize

    72KB

  • memory/3388-15-0x000000001BD20000-0x000000001BD44000-memory.dmp

    Filesize

    144KB

  • memory/3388-14-0x000000001BC30000-0x000000001BC56000-memory.dmp

    Filesize

    152KB

  • memory/3388-13-0x000000001BCF0000-0x000000001BD18000-memory.dmp

    Filesize

    160KB

  • memory/3388-12-0x000000001BCC0000-0x000000001BCEA000-memory.dmp

    Filesize

    168KB

  • memory/3388-11-0x000000001BC90000-0x000000001BCBC000-memory.dmp

    Filesize

    176KB

  • memory/3388-2-0x0000000003080000-0x00000000030BC000-memory.dmp

    Filesize

    240KB

  • memory/3388-9-0x000000001BC00000-0x000000001BC30000-memory.dmp

    Filesize

    192KB

  • memory/3388-1-0x0000000000FD0000-0x000000000100E000-memory.dmp

    Filesize

    248KB

  • memory/3388-43-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4488-44-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4488-48-0x000000001B330000-0x000000001B344000-memory.dmp

    Filesize

    80KB

  • memory/4488-49-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4488-47-0x0000000002710000-0x0000000002726000-memory.dmp

    Filesize

    88KB

  • memory/4488-46-0x000000001B190000-0x000000001B1B4000-memory.dmp

    Filesize

    144KB

  • memory/4488-45-0x0000000000D70000-0x0000000000D96000-memory.dmp

    Filesize

    152KB

  • memory/4488-50-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4488-51-0x00007FFD47820000-0x00007FFD482E1000-memory.dmp

    Filesize

    10.8MB