General
-
Target
26baf2fbfd19fc2b3fdd3bfb9ccc94d0_JaffaCakes118
-
Size
1.4MB
-
Sample
240508-zv6awshh67
-
MD5
26baf2fbfd19fc2b3fdd3bfb9ccc94d0
-
SHA1
b956e2cc743f37cc07d68bbca6125575d55dcf5d
-
SHA256
3af45339c0c5cf4fff07c8f46423e5b88a7d423b76b0809a3f9952671fa19f53
-
SHA512
da130f671883287756eb2fd3163b907a1be8947f81e6a24880c06b762d5190b5ee5488a699319871aa2f48075de225e838377c5c0d92fd8702702a4a4509138f
-
SSDEEP
24576:uur9gkEPGcHHXYbViiPKttHbgfE/sNOQzNelNghtZYeQ+iz9/SO+eOuENAUUdc1H:pr9gNGKXYJiRSfE0NZsWtM+kJv+ejKqy
Behavioral task
behavioral1
Sample
26baf2fbfd19fc2b3fdd3bfb9ccc94d0_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
nanocore
1.2.2.0
noway74.ddns.net:5556
06de780d-2603-4153-bb0d-62b9de2c5ca5
-
activate_away_mode
true
-
backup_connection_host
noway74.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-03-22T11:00:54.031861436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5556
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
06de780d-2603-4153-bb0d-62b9de2c5ca5
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
noway74.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
26baf2fbfd19fc2b3fdd3bfb9ccc94d0_JaffaCakes118
-
Size
1.4MB
-
MD5
26baf2fbfd19fc2b3fdd3bfb9ccc94d0
-
SHA1
b956e2cc743f37cc07d68bbca6125575d55dcf5d
-
SHA256
3af45339c0c5cf4fff07c8f46423e5b88a7d423b76b0809a3f9952671fa19f53
-
SHA512
da130f671883287756eb2fd3163b907a1be8947f81e6a24880c06b762d5190b5ee5488a699319871aa2f48075de225e838377c5c0d92fd8702702a4a4509138f
-
SSDEEP
24576:uur9gkEPGcHHXYbViiPKttHbgfE/sNOQzNelNghtZYeQ+iz9/SO+eOuENAUUdc1H:pr9gNGKXYJiRSfE0NZsWtM+kJv+ejKqy
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-