Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 00:13

General

  • Target

    JaffaCakes118_690f328aa5dfeac4a0961d2c7fa95540.exe

  • Size

    1.1MB

  • MD5

    690f328aa5dfeac4a0961d2c7fa95540

  • SHA1

    b611df94d77a8f285c237f688ae93ca294aa3ed6

  • SHA256

    f173e2748342cecb2f69e6d83fb4e1a2e8e02556a2e0f74411e901b2fe6a734b

  • SHA512

    a4e6a1f588d7450f4266d7cf7d6910f82f5e30618a29a5dc028ce2ccb1c8cc90cff1ec09a60f80f234cd758745ac65dd72f431eaec422d9dd1422db88fc032b5

  • SSDEEP

    24576:ztb20pkaCqT5TBWgNQ7aJmr52MU7hYM6A:wVg5tQ7aJY2MU9z5

Score
10/10

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690f328aa5dfeac4a0961d2c7fa95540.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690f328aa5dfeac4a0961d2c7fa95540.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Windows\server.exe
      C:\Windows/server.exe
      2⤵
      • Executes dropped EXE
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autAC7C.tmp

    Filesize

    66KB

    MD5

    ed75e620b9451086aa13833f836693df

    SHA1

    973c8a071c2a3366b72df52bba7646954774e19a

    SHA256

    15740a03882ae8a56d3a28ff725b7a697cd3595d0c9e9e9bf3a7310915bc76a2

    SHA512

    5b8126e92f21c4eb79b33395ef1bec1b452e0f804766f2932305b75016c0507a3c0b676fb85705dfcaf054b86aecee9e3f5585221d69caf255f8886e2c23a16a

  • C:\Windows\server.exe

    Filesize

    156KB

    MD5

    d9f54e2b6b5fae397ed2ec53da539362

    SHA1

    805eb1f334a564603896ef66b51d2de6adff90a3

    SHA256

    fd315f868bc5973954d9bb6b2f3e862e19ba49fb49960e75cbd176692df3cd2a

    SHA512

    ea809f62372a51e0f70439d2491f80728c3068bd24d416af57d5e9a9df52bed784acf67a2ae975c722515dc72e10e51adee68712b15131791f368f730593e12f

  • memory/2584-15-0x00007FFA9A3F5000-0x00007FFA9A3F6000-memory.dmp

    Filesize

    4KB

  • memory/2584-16-0x000000001B810000-0x000000001B946000-memory.dmp

    Filesize

    1.2MB

  • memory/2584-17-0x00007FFA9A140000-0x00007FFA9AAE1000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-18-0x000000001BE20000-0x000000001C2EE000-memory.dmp

    Filesize

    4.8MB

  • memory/2584-19-0x00007FFA9A140000-0x00007FFA9AAE1000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-20-0x0000000000F60000-0x0000000000F88000-memory.dmp

    Filesize

    160KB

  • memory/2584-21-0x0000000000F90000-0x0000000000FB4000-memory.dmp

    Filesize

    144KB

  • memory/2584-23-0x0000000001270000-0x000000000128E000-memory.dmp

    Filesize

    120KB

  • memory/2584-22-0x0000000000FB0000-0x0000000000FD0000-memory.dmp

    Filesize

    128KB

  • memory/2584-24-0x000000001C900000-0x000000001C99C000-memory.dmp

    Filesize

    624KB

  • memory/2584-26-0x00007FFA9A140000-0x00007FFA9AAE1000-memory.dmp

    Filesize

    9.6MB