Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 02:13

General

  • Target

    JaffaCakes118_699a4124f54535d6846e4b68b1396520.exe

  • Size

    151KB

  • MD5

    699a4124f54535d6846e4b68b1396520

  • SHA1

    f4da9f0dea2b03485777fa99e72046e8e7e745a3

  • SHA256

    07eeca89a28dfb3215f5902ec1bb615f3c50e14f12ac2f1dedf399bfc46812fa

  • SHA512

    e1755f9b6ce195f594c6a549e25df92aa11303b12eea2882420d80d99b7e4f8959eea062e5977c982e12e066ea72f3fb6eb3ab76a31bdddce90a4ad1e9f7e267

  • SSDEEP

    3072:Y4/Hmc5MCcHGpVSkt+DqE7VIp/afUcCXKiDOHsacb3pjGmFYflwKb8c:YcNL5+CxacuMacrpjGmFYNwS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jgj

C2

kakam50.no-ip.biz:5552

Mutex

5ef1dd4d005ba321ffd356a3a05a85b2

Attributes
  • reg_key

    5ef1dd4d005ba321ffd356a3a05a85b2

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_699a4124f54535d6846e4b68b1396520.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_699a4124f54535d6846e4b68b1396520.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      "C:\Users\Admin\AppData\Local\Temp\test.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\SYSTEM32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\test.exe" "test.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\test.exe

    Filesize

    151KB

    MD5

    699a4124f54535d6846e4b68b1396520

    SHA1

    f4da9f0dea2b03485777fa99e72046e8e7e745a3

    SHA256

    07eeca89a28dfb3215f5902ec1bb615f3c50e14f12ac2f1dedf399bfc46812fa

    SHA512

    e1755f9b6ce195f594c6a549e25df92aa11303b12eea2882420d80d99b7e4f8959eea062e5977c982e12e066ea72f3fb6eb3ab76a31bdddce90a4ad1e9f7e267

  • memory/1964-0-0x00007FF83CB53000-0x00007FF83CB55000-memory.dmp

    Filesize

    8KB

  • memory/1964-1-0x0000000000790000-0x00000000007BC000-memory.dmp

    Filesize

    176KB

  • memory/1964-2-0x0000000002950000-0x000000000297C000-memory.dmp

    Filesize

    176KB

  • memory/1964-3-0x000000001B280000-0x000000001B2AA000-memory.dmp

    Filesize

    168KB

  • memory/1964-4-0x000000001B2E0000-0x000000001B30A000-memory.dmp

    Filesize

    168KB

  • memory/1964-5-0x000000001B310000-0x000000001B338000-memory.dmp

    Filesize

    160KB

  • memory/1964-18-0x000000001BD30000-0x000000001BD50000-memory.dmp

    Filesize

    128KB

  • memory/1964-8-0x000000001B3A0000-0x000000001B3C6000-memory.dmp

    Filesize

    152KB

  • memory/1964-7-0x000000001B370000-0x000000001B398000-memory.dmp

    Filesize

    160KB

  • memory/1964-6-0x000000001B340000-0x000000001B368000-memory.dmp

    Filesize

    160KB

  • memory/1964-17-0x000000001BD10000-0x000000001BD30000-memory.dmp

    Filesize

    128KB

  • memory/1964-28-0x000000001BE70000-0x000000001BE88000-memory.dmp

    Filesize

    96KB

  • memory/1964-47-0x000000001BFD0000-0x000000001BFDC000-memory.dmp

    Filesize

    48KB

  • memory/1964-46-0x000000001BFC0000-0x000000001BFCA000-memory.dmp

    Filesize

    40KB

  • memory/1964-45-0x000000001BFB0000-0x000000001BFBC000-memory.dmp

    Filesize

    48KB

  • memory/1964-44-0x000000001BFA0000-0x000000001BFAC000-memory.dmp

    Filesize

    48KB

  • memory/1964-42-0x000000001BF80000-0x000000001BF8E000-memory.dmp

    Filesize

    56KB

  • memory/1964-43-0x000000001BF90000-0x000000001BF9C000-memory.dmp

    Filesize

    48KB

  • memory/1964-41-0x000000001BF70000-0x000000001BF7E000-memory.dmp

    Filesize

    56KB

  • memory/1964-40-0x000000001BF60000-0x000000001BF70000-memory.dmp

    Filesize

    64KB

  • memory/1964-39-0x000000001BF50000-0x000000001BF60000-memory.dmp

    Filesize

    64KB

  • memory/1964-38-0x000000001BF40000-0x000000001BF50000-memory.dmp

    Filesize

    64KB

  • memory/1964-37-0x000000001BF30000-0x000000001BF42000-memory.dmp

    Filesize

    72KB

  • memory/1964-36-0x000000001BF20000-0x000000001BF32000-memory.dmp

    Filesize

    72KB

  • memory/1964-35-0x000000001BF10000-0x000000001BF22000-memory.dmp

    Filesize

    72KB

  • memory/1964-34-0x000000001BF00000-0x000000001BF14000-memory.dmp

    Filesize

    80KB

  • memory/1964-33-0x000000001BEF0000-0x000000001BF04000-memory.dmp

    Filesize

    80KB

  • memory/1964-32-0x000000001BEE0000-0x000000001BEF6000-memory.dmp

    Filesize

    88KB

  • memory/1964-31-0x000000001BED0000-0x000000001BEE6000-memory.dmp

    Filesize

    88KB

  • memory/1964-30-0x000000001BEB0000-0x000000001BEC6000-memory.dmp

    Filesize

    88KB

  • memory/1964-29-0x000000001BE90000-0x000000001BEA8000-memory.dmp

    Filesize

    96KB

  • memory/1964-27-0x000000001BE50000-0x000000001BE68000-memory.dmp

    Filesize

    96KB

  • memory/1964-26-0x000000001BE30000-0x000000001BE4A000-memory.dmp

    Filesize

    104KB

  • memory/1964-25-0x000000001BE10000-0x000000001BE2A000-memory.dmp

    Filesize

    104KB

  • memory/1964-24-0x000000001BDF0000-0x000000001BE0C000-memory.dmp

    Filesize

    112KB

  • memory/1964-23-0x000000001BDD0000-0x000000001BDEC000-memory.dmp

    Filesize

    112KB

  • memory/1964-22-0x000000001BDB0000-0x000000001BDCC000-memory.dmp

    Filesize

    112KB

  • memory/1964-21-0x000000001BD90000-0x000000001BDAE000-memory.dmp

    Filesize

    120KB

  • memory/1964-20-0x000000001BD70000-0x000000001BD8E000-memory.dmp

    Filesize

    120KB

  • memory/1964-19-0x000000001BD50000-0x000000001BD6E000-memory.dmp

    Filesize

    120KB

  • memory/1964-16-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB

  • memory/1964-15-0x000000001BCF0000-0x000000001BD12000-memory.dmp

    Filesize

    136KB

  • memory/1964-14-0x000000001BCD0000-0x000000001BCF2000-memory.dmp

    Filesize

    136KB

  • memory/1964-13-0x000000001BCB0000-0x000000001BCD2000-memory.dmp

    Filesize

    136KB

  • memory/1964-12-0x000000001BC90000-0x000000001BCB4000-memory.dmp

    Filesize

    144KB

  • memory/1964-11-0x000000001B2B0000-0x000000001B2D4000-memory.dmp

    Filesize

    144KB

  • memory/1964-10-0x0000000002980000-0x00000000029A6000-memory.dmp

    Filesize

    152KB

  • memory/1964-9-0x0000000002820000-0x0000000002846000-memory.dmp

    Filesize

    152KB

  • memory/1964-60-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB

  • memory/4072-61-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB

  • memory/4072-64-0x000000001BA80000-0x000000001BAA4000-memory.dmp

    Filesize

    144KB

  • memory/4072-65-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB

  • memory/4072-68-0x000000001BC40000-0x000000001BC54000-memory.dmp

    Filesize

    80KB

  • memory/4072-67-0x0000000002FE0000-0x0000000002FF6000-memory.dmp

    Filesize

    88KB

  • memory/4072-66-0x0000000001640000-0x0000000001656000-memory.dmp

    Filesize

    88KB

  • memory/4072-63-0x000000001BA60000-0x000000001BA86000-memory.dmp

    Filesize

    152KB

  • memory/4072-62-0x0000000003160000-0x0000000003186000-memory.dmp

    Filesize

    152KB

  • memory/4072-70-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB

  • memory/4072-71-0x00007FF83CB50000-0x00007FF83D611000-memory.dmp

    Filesize

    10.8MB