Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe
-
Size
465KB
-
MD5
3d63d1c5a34c44dbb9afda0989b55295
-
SHA1
1bcca2f8431c769d3a930430ebb2a41c20347f75
-
SHA256
ee2845452cc4f982738d1e47ae8b8fd2fd815c78bc846d5abe1a20308ad91866
-
SHA512
1225c2e58c6a4460382f1d5803b89943ac7a82039aa6d5dd924777c070594e8ec9d3e613eea4b74cb326e39145e00f9e9f71f5902329be64168addbf82d7299e
-
SSDEEP
6144:icAUcCVyuuU7TfGptV/w0gS3J2/7pMJwG6ZUa9klSrwHlruukABclcV3V+:ibUcWDvStNwbr/SJAKa6lSrwPucG
Malware Config
Extracted
nanocore
1.2.2.0
bornsinner.myq-see.com:3941
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65542
-
build_time
2020-02-03T06:34:44.711604836Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
3994
-
connection_port
3941
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
bornsinner.myq-see.com
-
primary_dns_server
bornsinner.myq-see.com
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exedescription pid process target process PID 3068 set thread context of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1724 schtasks.exe 4516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exeMSBuild.exepid process 3756 powershell.exe 3756 powershell.exe 1980 MSBuild.exe 1980 MSBuild.exe 1980 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
MSBuild.exepid process 1980 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 3756 powershell.exe Token: SeDebugPrivilege 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe Token: SeDebugPrivilege 1980 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exeMSBuild.exedescription pid process target process PID 3068 wrote to memory of 3756 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 3756 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 3756 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 1724 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe schtasks.exe PID 3068 wrote to memory of 1724 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe schtasks.exe PID 3068 wrote to memory of 1724 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe schtasks.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 3068 wrote to memory of 1980 3068 3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe MSBuild.exe PID 1980 wrote to memory of 4516 1980 MSBuild.exe schtasks.exe PID 1980 wrote to memory of 4516 1980 MSBuild.exe schtasks.exe PID 1980 wrote to memory of 4516 1980 MSBuild.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d63d1c5a34c44dbb9afda0989b55295_JaffaCakes118.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SXvGTDXt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4FD1.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "AGP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp5416.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Impair Defenses
2Disable or Modify Tools
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wvkg3wgk.bs2.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp4FD1.tmpFilesize
1KB
MD5bb1695e5af3114fa52119815c488404e
SHA1dc2aea9697fa1a514eeebf89264b3ccf0645877d
SHA256837b6dc0a0022670ffeb535d50511a92339aa4f5989ce0bccf9d1b9787f7e19b
SHA5120c99b5d3b50fd67f55cf90fc75beb283d2a395d72be36c15c501e040d0ebecb21e004fd22a6e401eada5f625de24adbc4feaac3d1d3ef15bdc9a3ac4415870a6
-
C:\Users\Admin\AppData\Local\Temp\tmp5416.tmpFilesize
1KB
MD5ae766004c0d8792953bafffe8f6a2e3b
SHA114b12f27543a401e2fe0af8052e116cab0032426
SHA2561abdd9b6a6b84e4ba1af1282dc84ce276c59ba253f4c4af05fea498a4fd99540
SHA512e530da4a5d4336fc37838d0e93b5eb3804b9c489c71f6954a47fc81a4c655bb72ec493e109cf96e6e3617d7623ac80697ad3bbd5ffc6281bafc8b34dca5e6567
-
memory/1980-63-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/1980-69-0x0000000075282000-0x0000000075283000-memory.dmpFilesize
4KB
-
memory/1980-68-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/1980-60-0x0000000075282000-0x0000000075283000-memory.dmpFilesize
4KB
-
memory/1980-61-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/1980-58-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/3068-4-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/3068-3-0x0000000075282000-0x0000000075283000-memory.dmpFilesize
4KB
-
memory/3068-62-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/3068-0-0x0000000075282000-0x0000000075283000-memory.dmpFilesize
4KB
-
memory/3068-2-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/3068-1-0x0000000075280000-0x0000000075831000-memory.dmpFilesize
5.7MB
-
memory/3756-37-0x0000000007750000-0x000000000776E000-memory.dmpFilesize
120KB
-
memory/3756-45-0x0000000007CC0000-0x0000000007CD1000-memory.dmpFilesize
68KB
-
memory/3756-25-0x0000000006D50000-0x0000000006D82000-memory.dmpFilesize
200KB
-
memory/3756-26-0x000000006F1B0000-0x000000006F1FC000-memory.dmpFilesize
304KB
-
memory/3756-32-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-23-0x0000000006770000-0x000000000678E000-memory.dmpFilesize
120KB
-
memory/3756-39-0x0000000007970000-0x0000000007A13000-memory.dmpFilesize
652KB
-
memory/3756-38-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-40-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-41-0x0000000008100000-0x000000000877A000-memory.dmpFilesize
6.5MB
-
memory/3756-42-0x0000000007AC0000-0x0000000007ADA000-memory.dmpFilesize
104KB
-
memory/3756-43-0x0000000007B30000-0x0000000007B3A000-memory.dmpFilesize
40KB
-
memory/3756-44-0x0000000007D40000-0x0000000007DD6000-memory.dmpFilesize
600KB
-
memory/3756-24-0x00000000067C0000-0x000000000680C000-memory.dmpFilesize
304KB
-
memory/3756-46-0x0000000007CF0000-0x0000000007CFE000-memory.dmpFilesize
56KB
-
memory/3756-47-0x0000000007D00000-0x0000000007D14000-memory.dmpFilesize
80KB
-
memory/3756-48-0x0000000007E00000-0x0000000007E1A000-memory.dmpFilesize
104KB
-
memory/3756-49-0x0000000007DE0000-0x0000000007DE8000-memory.dmpFilesize
32KB
-
memory/3756-52-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-22-0x0000000006230000-0x0000000006584000-memory.dmpFilesize
3.3MB
-
memory/3756-12-0x0000000006020000-0x0000000006086000-memory.dmpFilesize
408KB
-
memory/3756-11-0x0000000006090000-0x00000000060F6000-memory.dmpFilesize
408KB
-
memory/3756-10-0x00000000057B0000-0x00000000057D2000-memory.dmpFilesize
136KB
-
memory/3756-8-0x0000000005870000-0x0000000005E98000-memory.dmpFilesize
6.2MB
-
memory/3756-9-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-7-0x0000000072D30000-0x00000000734E0000-memory.dmpFilesize
7.7MB
-
memory/3756-6-0x0000000005200000-0x0000000005236000-memory.dmpFilesize
216KB
-
memory/3756-5-0x0000000072D3E000-0x0000000072D3F000-memory.dmpFilesize
4KB