Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 03:26

General

  • Target

    JaffaCakes118_88a24d4f65891f29c3b494787d3e840d.exe

  • Size

    240KB

  • MD5

    88a24d4f65891f29c3b494787d3e840d

  • SHA1

    ef4465bab7d07c5ff2ecc8597971d194ebe46b27

  • SHA256

    17ecfe8188074fedb16f3b5185ecb5af63ebff552a47c26544b52ed5e9ac7827

  • SHA512

    5e3179a5305762c67f6dbcfc2a0f264f8ff1c095bad8ca8490610113332212bca2b4118f5a35a1db909d5c8881e43efbb1f761115f66b209a73ebd30d02d894d

  • SSDEEP

    3072:4meSGmFf5xcgKFrcT4MQ+AxrzexiRyVhGzWrp7zSXxTdllPCWb6SuL5Hg8Jti8v7:4+GmB7YFrSC3QsRyVhGzWrp7mhTdUHn

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

거래

C2

gpemtit123.kro.kr:1234

Mutex

b291ea2cd036a5d9e56147750b07fc8d

Attributes
  • reg_key

    b291ea2cd036a5d9e56147750b07fc8d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88a24d4f65891f29c3b494787d3e840d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88a24d4f65891f29c3b494787d3e840d.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SYSTEM32\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88a24d4f65891f29c3b494787d3e840d.exe" "JaffaCakes118_88a24d4f65891f29c3b494787d3e840d.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1392-0-0x00007FFF61605000-0x00007FFF61606000-memory.dmp

    Filesize

    4KB

  • memory/1392-1-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1392-2-0x000000001C200000-0x000000001C6CE000-memory.dmp

    Filesize

    4.8MB

  • memory/1392-3-0x00000000018A0000-0x00000000018B4000-memory.dmp

    Filesize

    80KB

  • memory/1392-10-0x0000000001830000-0x0000000001852000-memory.dmp

    Filesize

    136KB

  • memory/1392-9-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1392-8-0x000000001C7B0000-0x000000001C7DA000-memory.dmp

    Filesize

    168KB

  • memory/1392-11-0x000000001C7E0000-0x000000001C7FC000-memory.dmp

    Filesize

    112KB

  • memory/1392-7-0x000000001C780000-0x000000001C7B2000-memory.dmp

    Filesize

    200KB

  • memory/1392-6-0x000000001C740000-0x000000001C778000-memory.dmp

    Filesize

    224KB

  • memory/1392-12-0x000000001C720000-0x000000001C72C000-memory.dmp

    Filesize

    48KB

  • memory/1392-13-0x000000001C8B0000-0x000000001C956000-memory.dmp

    Filesize

    664KB

  • memory/1392-15-0x000000001CC60000-0x000000001CCFC000-memory.dmp

    Filesize

    624KB

  • memory/1392-16-0x00007FFF61605000-0x00007FFF61606000-memory.dmp

    Filesize

    4KB

  • memory/1392-17-0x0000000001850000-0x0000000001858000-memory.dmp

    Filesize

    32KB

  • memory/1392-18-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1392-19-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1392-20-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB

  • memory/1392-21-0x00007FFF61350000-0x00007FFF61CF1000-memory.dmp

    Filesize

    9.6MB