Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe
-
Size
907KB
-
MD5
1b21cc86b8c6265e0a01bb8886de3f96
-
SHA1
41e9925a87042f90a0ada558e105b1bc18e435f5
-
SHA256
0220a3ae6cbda6cdc544fc2d115029d570f3ae05b4ec7d8253908bb66ae9c845
-
SHA512
811a610706c6bde3aef64e9b29387026f2ae2067e3908f4e11166713c18ee16527a63c52c02843b38b26703c88a6da94399ac2a287b73f8edbd4ca4cfbe94f20
-
SSDEEP
12288:pV2cqiK+Kr8PNjpKJjqo5TQZyf7SBNiQb05gQMhMLhu4LFBjyr9+H7EuHlsloO80:ppQ7sNkj5Iig1az3i+HpO
Malware Config
Extracted
nanocore
1.2.2.0
finlandmc.com:54984
127.0.0.1:54984
b7c5d67b-f577-4d35-adc7-6994a8049b53
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-07-14T18:20:34.159605436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b7c5d67b-f577-4d35-adc7-6994a8049b53
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
finlandmc.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1372-7-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/1372-9-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/1372-12-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/1372-6-0x0000000000400000-0x0000000000483000-memory.dmp upx behavioral2/memory/1372-4-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exedescription pid process target process PID 716 set thread context of 1372 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exepid process 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1372 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1372 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1372 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exepid process 1372 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exepid process 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1372 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exedescription pid process target process PID 716 wrote to memory of 1372 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe PID 716 wrote to memory of 1372 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe PID 716 wrote to memory of 1372 716 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe 1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b21cc86b8c6265e0a01bb8886de3f96_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1372