General
-
Target
JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0
-
Size
94KB
-
Sample
250104-1lq1aaynbx
-
MD5
7be5c8a7edcc9ee2eb6f7d75623058f0
-
SHA1
636bbbd64d414de1a076b18e80787e3cff56b9d7
-
SHA256
e82dab66d9eee1e6773914621820e09af5edaf3872154cb6b788d3fe672cf178
-
SHA512
a9a352ee920278fd1f03e607809ae57ddb0553a7a17f72012e8e3434b6ee48f22eb63d26aba0bbb0370ce8f7bfbe7f1c8e4f3f490c12352a134b15b32c95f3aa
-
SSDEEP
1536:9lWhT3kaxkhF4yaAZsVQZ+Mj0PcbWBL6edOyDA4QsytmsXNYlfXX25p0DLYtnT3c:9Yh4mZd3r3w0uo07ijMra
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0
-
Size
94KB
-
MD5
7be5c8a7edcc9ee2eb6f7d75623058f0
-
SHA1
636bbbd64d414de1a076b18e80787e3cff56b9d7
-
SHA256
e82dab66d9eee1e6773914621820e09af5edaf3872154cb6b788d3fe672cf178
-
SHA512
a9a352ee920278fd1f03e607809ae57ddb0553a7a17f72012e8e3434b6ee48f22eb63d26aba0bbb0370ce8f7bfbe7f1c8e4f3f490c12352a134b15b32c95f3aa
-
SSDEEP
1536:9lWhT3kaxkhF4yaAZsVQZ+Mj0PcbWBL6edOyDA4QsytmsXNYlfXX25p0DLYtnT3c:9Yh4mZd3r3w0uo07ijMra
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3