Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2025, 15:42 UTC

General

  • Target

    JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe

  • Size

    171KB

  • MD5

    6daff7065db802cb1e78bbdbe2907d80

  • SHA1

    6532e5cecd2c3606b8dc2be11959cff4dbd5d2c2

  • SHA256

    7df2623cbf4a0611576e1f7859899084272d6ff59f67e7a66e1771fcde66bd1c

  • SHA512

    0349c5d93979cfa24ede4b3bb8ab9bd61d67d868a7cb1d55cbac0ff03a1eecda6d46106848541a26a538faf7a865582470c4d561d8b2c45b8bb761e2a67c3570

  • SSDEEP

    3072:ap6SSbb4HPwwPnetLrlyi2ayjrY/etoOOV402owBqRK6ggkCtF7:h4vwmRD+yhBqRK5Cf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZZZAU

C2

desgarrada1.no-ip.org:1177

Mutex

0da05431f6f5ca78981bce022c11b0b7

Attributes
  • reg_key

    0da05431f6f5ca78981bce022c11b0b7

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\chrome.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Users\Admin\AppData\Local\Temp\chrome.exe
          C:\Users\Admin\AppData\Local\Temp\chrome.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3688
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chrome.exe" "chrome.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3208

Network

  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    8.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.153.16.2.in-addr.arpa
    IN PTR
    Response
    8.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-8deploystaticakamaitechnologiescom
  • flag-us
    DNS
    20.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    20.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    212.20.149.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    212.20.149.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    desgarrada1.no-ip.org
    chrome.exe
    Remote address:
    8.8.8.8:53
    Request
    desgarrada1.no-ip.org
    IN A
    Response
    desgarrada1.no-ip.org
    IN A
    0.0.0.0
  • flag-us
    DNS
    29.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.153.16.2.in-addr.arpa
    IN PTR
    Response
    29.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-29deploystaticakamaitechnologiescom
  • flag-us
    DNS
    48.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    48.229.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    146 B
    159 B
    2
    1

    DNS Request

    228.249.119.40.in-addr.arpa

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    8.153.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    8.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    20.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    20.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    212.20.149.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    212.20.149.52.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    desgarrada1.no-ip.org
    dns
    chrome.exe
    67 B
    83 B
    1
    1

    DNS Request

    desgarrada1.no-ip.org

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    29.153.16.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    29.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    48.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    48.229.111.52.in-addr.arpa

  • 8.8.8.8:53

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80.exe.log

    Filesize

    1KB

    MD5

    c9713c2451460e25229fc2c8c29304bd

    SHA1

    37723f36c129b83ed2cbac2d02cfe0b0dd2b66e3

    SHA256

    989598abf72767f1004dbaeb72db7166970649c1870f508e90020315ea760528

    SHA512

    4693b7faa95e828ce64987de95e1a85532958d84051539119f107a56d04cb0248b35ac365d3a2324852e7ec44ed50d4ca0fad16838834b614449076220119b93

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe

    Filesize

    171KB

    MD5

    6daff7065db802cb1e78bbdbe2907d80

    SHA1

    6532e5cecd2c3606b8dc2be11959cff4dbd5d2c2

    SHA256

    7df2623cbf4a0611576e1f7859899084272d6ff59f67e7a66e1771fcde66bd1c

    SHA512

    0349c5d93979cfa24ede4b3bb8ab9bd61d67d868a7cb1d55cbac0ff03a1eecda6d46106848541a26a538faf7a865582470c4d561d8b2c45b8bb761e2a67c3570

  • memory/2160-22-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/2160-6-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2160-9-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/3688-34-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/3688-33-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/3688-32-0x0000000005000000-0x000000000500A000-memory.dmp

    Filesize

    40KB

  • memory/3688-31-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/3688-29-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4692-23-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4692-21-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4692-28-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4912-0-0x000000007527E000-0x000000007527F000-memory.dmp

    Filesize

    4KB

  • memory/4912-5-0x000000007527E000-0x000000007527F000-memory.dmp

    Filesize

    4KB

  • memory/4912-4-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/4912-3-0x0000000005D40000-0x00000000062E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4912-2-0x00000000056F0000-0x000000000578C000-memory.dmp

    Filesize

    624KB

  • memory/4912-1-0x0000000000E60000-0x0000000000E88000-memory.dmp

    Filesize

    160KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.