Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 11:12

General

  • Target

    JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe

  • Size

    179KB

  • MD5

    a019524e37f4d720d524b115b5d83f0c

  • SHA1

    d6966cb69cea2c3b8eec893210a1efd80cfc3179

  • SHA256

    efa52eaf124f191c42b55e40d719ca1382d9953280741debb07a32aba87d45a6

  • SHA512

    375e5b58e99695b69c93b456ef0c13f7efd9e2bab79228136d0350b4fd137b6fd449469fc10265a019f75897a9f70f6c8a6509135b3cd95ff70f34b203697a33

  • SSDEEP

    3072:IzlnaCPE9mf6TLSsEhWD9OP7vN4GHJFV6SFBE48giTzBG4LA0w6zH0vvEdvuB91z:IzFaEEAfaSsU8ODBJX6SFozBA0w6zUnZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

anonymouskillerbr1.duckdns.org:8080

Mutex

061718407ec7ca758146cb8944a62980

Attributes
  • reg_key

    061718407ec7ca758146cb8944a62980

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Update\HwgugQ" /XML "C:\Users\Admin\AppData\Local\Temp\aBBBBB.xml"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3056
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
          "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:792
          • C:\Users\Admin\AppData\Roaming\Teste.exe
            "C:\Users\Admin\AppData\Roaming\Teste.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3000
            • C:\Users\Admin\AppData\Roaming\Teste.exe
              "C:\Users\Admin\AppData\Roaming\Teste.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2136
              • C:\Users\Admin\AppData\Roaming\Teste.exe
                "C:\Users\Admin\AppData\Roaming\Teste.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2828
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /TN "Update\HwgugQ" /XML "C:\Users\Admin\AppData\Local\Temp\aOOOOO.xml"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:984
                • C:\Users\Admin\AppData\Roaming\Teste.exe
                  "C:\Users\Admin\AppData\Roaming\Teste.exe"
                  8⤵
                  • Drops startup file
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:536
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Teste.exe" "Teste.exe" ENABLE
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aBBBBB.xml

    Filesize

    1KB

    MD5

    44c316145288b2d78a5beb273aaf6a6f

    SHA1

    48ef472da038bfac7b52bbaf89e4116344416794

    SHA256

    5f1823816606379a2f3d782b20d2d707ac09d743949f78c2b2dd34978bde1d74

    SHA512

    850a13520f21dbecb5ca19651a394b2e9df5f25bbeea2b1d81bcd029790414ad2479b361354b0f0e9723f3d52128b3421c69910f3fba4b6d81860b51d33fd501

  • C:\Users\Admin\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch

    Filesize

    390B

    MD5

    5c24cd0ec59097cf5cf281dc876f2b59

    SHA1

    7274d75bf6039b45d56e45ad7cdb2d424c5e27da

    SHA256

    b8578c97075b09493ce3e85f851102281b3be140088f19c2feda4948e542bc89

    SHA512

    a534967f6c64b22b5177a17fb813d9ddc78aa2ae11d2894490e5500cfc5e348b156b0b627bd64f5677fd3e01459da5dce2d96cfc79613fbfee8eadacd45859c8

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

    Filesize

    820B

    MD5

    cba5b3a9785a0339e31a4b4f61195ddd

    SHA1

    41bd7e2dfcbca3ad539ffa27b7e2dd167615e845

    SHA256

    5e42ba9b8902fbf453a7376eaa0d802298e436d3d7190c555761212851c2b262

    SHA512

    d5d9622abedbcc7045603014b4664294912293703715c5108b163622f7192095ee7984eb7716f9d63ab20f7fe92ab2927b49aa374896fb3039cf868ce52b16b1

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

    Filesize

    478B

    MD5

    99988380f1c8070149619e1a85d865fd

    SHA1

    3b2ff356f9ba0fb61bf1d76792b3eff6e2a6e2de

    SHA256

    9c6ea6195f1e7fadcdb86556998fc6b0595a135845068817fcc84a7dd035f21b

    SHA512

    26894da85812600693a1aecb413fb64f02a2ca2b114854e333abd55b8eef3ace09e420107c7eb5914ac54032501870f66d55ea7424e0b1342f8b9d633307a8a1

  • \Users\Admin\AppData\Roaming\Teste.exe

    Filesize

    179KB

    MD5

    a019524e37f4d720d524b115b5d83f0c

    SHA1

    d6966cb69cea2c3b8eec893210a1efd80cfc3179

    SHA256

    efa52eaf124f191c42b55e40d719ca1382d9953280741debb07a32aba87d45a6

    SHA512

    375e5b58e99695b69c93b456ef0c13f7efd9e2bab79228136d0350b4fd137b6fd449469fc10265a019f75897a9f70f6c8a6509135b3cd95ff70f34b203697a33

  • memory/792-56-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-54-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-58-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-61-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-64-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-68-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/792-69-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2136-92-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2172-0-0x0000000074CC1000-0x0000000074CC2000-memory.dmp

    Filesize

    4KB

  • memory/2172-2-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2172-1-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2172-42-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-50-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-29-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-49-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-35-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-32-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-46-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-44-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-25-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2576-67-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2576-27-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2752-6-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-23-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-48-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-24-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-17-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-19-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-41-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-9-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-70-0x0000000074CC0000-0x000000007526B000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2752-12-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-4-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2752-3-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB