Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 11:12

General

  • Target

    JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe

  • Size

    179KB

  • MD5

    a019524e37f4d720d524b115b5d83f0c

  • SHA1

    d6966cb69cea2c3b8eec893210a1efd80cfc3179

  • SHA256

    efa52eaf124f191c42b55e40d719ca1382d9953280741debb07a32aba87d45a6

  • SHA512

    375e5b58e99695b69c93b456ef0c13f7efd9e2bab79228136d0350b4fd137b6fd449469fc10265a019f75897a9f70f6c8a6509135b3cd95ff70f34b203697a33

  • SSDEEP

    3072:IzlnaCPE9mf6TLSsEhWD9OP7vN4GHJFV6SFBE48giTzBG4LA0w6zH0vvEdvuB91z:IzFaEEAfaSsU8ODBJX6SFozBA0w6zUnZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

anonymouskillerbr1.duckdns.org:8080

Mutex

061718407ec7ca758146cb8944a62980

Attributes
  • reg_key

    061718407ec7ca758146cb8944a62980

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
      2⤵
        PID:4880
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
          "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Update\HwgugQ" /XML "C:\Users\Admin\AppData\Local\Temp\akkkkk.xml"
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4080
          • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe
            "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe"
            4⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1108
            • C:\Users\Admin\AppData\Roaming\Teste.exe
              "C:\Users\Admin\AppData\Roaming\Teste.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2348
              • C:\Users\Admin\AppData\Roaming\Teste.exe
                "C:\Users\Admin\AppData\Roaming\Teste.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4592
                • C:\Users\Admin\AppData\Roaming\Teste.exe
                  "C:\Users\Admin\AppData\Roaming\Teste.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5080
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /TN "Update\HwgugQ" /XML "C:\Users\Admin\AppData\Local\Temp\aUUUUU.xml"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4700
                  • C:\Users\Admin\AppData\Roaming\Teste.exe
                    "C:\Users\Admin\AppData\Roaming\Teste.exe"
                    8⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2736
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Teste.exe" "Teste.exe" ENABLE
                      9⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\JaffaCakes118_a019524e37f4d720d524b115b5d83f0c.exe.log

      Filesize

      223B

      MD5

      cde6529abeea500fb852f29ba0da6115

      SHA1

      45f2f48492417ae6a0eade8aaa808d3d1d760743

      SHA256

      d7f4964443470b6729865676d76f5f1f416da633033071c34ea5eb19cdea53b5

      SHA512

      c95fa7faf6a90f32060dba70f79c4d66c68d6eec587306fb98f36fc3ba5d377ebf9dabf47298b71db208fb10f7ccb4e0ed82236c8f26bcc746552588bbb38234

    • C:\Users\Admin\AppData\Local\Temp\akkkkk.xml

      Filesize

      1KB

      MD5

      90e26efb00e2c0d764e72fe4f7514c55

      SHA1

      8ca0a995a6b541331bbd6862a896281a10723cfb

      SHA256

      453380dfd59a8abcbb915a87be9120e7365014f3c0a0db4d44ed637f720833ed

      SHA512

      e09adcd8fd490db772e679c560cede097298268e934be24fa9af30ddef64f926c26a5640a452b3258cd93ff4e2f6de8163fa06aef194b69cd099f3575eb2f3c3

    • C:\Users\Admin\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch

      Filesize

      390B

      MD5

      846b61cc2d4b8286c8f64195182b351c

      SHA1

      c42cf102eef44c4d53f8022a08d2f0fcad696897

      SHA256

      4271564ce5e88c6f00a009056c94d55e29732bcd2d8ea13529bd1d98c74142ed

      SHA512

      9c106662fefa58aa493f3f413e0d62ab56a55a53b7c404d35d3630d130d5b0de18aa4d9f07fc501de08b927cac991b98ca62a527dc6059384b2d150e8d4c6153

    • C:\Users\Admin\AppData\Roaming\Teste.exe

      Filesize

      179KB

      MD5

      a019524e37f4d720d524b115b5d83f0c

      SHA1

      d6966cb69cea2c3b8eec893210a1efd80cfc3179

      SHA256

      efa52eaf124f191c42b55e40d719ca1382d9953280741debb07a32aba87d45a6

      SHA512

      375e5b58e99695b69c93b456ef0c13f7efd9e2bab79228136d0350b4fd137b6fd449469fc10265a019f75897a9f70f6c8a6509135b3cd95ff70f34b203697a33

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

      Filesize

      820B

      MD5

      17c3fde98dd5a4a0c91e7b76c005f9f6

      SHA1

      9c84d48ef6d578dd1ac34dcf7c91d8d42fc88dbd

      SHA256

      69e75e7dc27e5e90d9cbd1c6a615a57f1763a1a370152f97a0d0d0f7ff0ba34e

      SHA512

      35b8b1cf10107aec637566844ae792b53a72c734ed6646666f4d52c77ef5445c6e76d2cc42ff1ba1df81da39d7724e64fc349b99ede767cde77b0d483c473d46

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

      Filesize

      478B

      MD5

      35061c398492baee27244fec25c9c75f

      SHA1

      c7c302f284b9e7e402aa4f0b6afef15ca826abd3

      SHA256

      855e6ecbeb9ef9b22901e3c2adc5dc5aa812f36938f1f2452bdcb3e2c2965cdd

      SHA512

      d3728bf988aa5e902ccdebadd692376a72bfabe7631698a83479a3d5991d722928f353c812e5f1b70a0de6b07d043a8276f07b09ea0e633faab37d6e12b63192

    • memory/1016-23-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1016-3-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1016-20-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1016-5-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1016-11-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1016-16-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1016-4-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1108-30-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1108-35-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1108-31-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1108-32-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1108-47-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1772-1-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1772-0-0x0000000074CF2000-0x0000000074CF3000-memory.dmp

      Filesize

      4KB

    • memory/1772-2-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1772-19-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-27-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-34-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-12-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2720-13-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2720-14-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2720-28-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB

    • memory/2720-24-0x0000000074CF0000-0x00000000752A1000-memory.dmp

      Filesize

      5.7MB