Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
484e27072482dbdaad8dc5ba3b42ee02
-
SHA1
4ee146db76435dd8db6678b0a3b1c1e6d167469e
-
SHA256
8feb48eae4ca6d55b2d5ad244917791ba9129f821b92d451dd7f02c64b3b5541
-
SHA512
5fd696e79a62b2caf8ea939ed77c8175f6bdf7bd5a316011e7aaf0cba81683669d9fe7197a3d740e9a196dd0143831864ba13725f0260f3892403db264955668
-
SSDEEP
6144:sM2LRbpRbW/yTgXyYSZIaQdaS1BCjLxzi/oyF32SCQoSd:sMqbXTXqa0aSvALs/pF3vZoA
Malware Config
Extracted
nanocore
1.2.2.0
alexandernegri.hopto.org:5993
225f64e8-e1a6-4cef-bb71-7e98ffd9cffd
-
activate_away_mode
true
-
backup_connection_host
alexandernegri.hopto.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2017-11-10T22:57:15.123982736Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
5993
-
default_group
LAP
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
225f64e8-e1a6-4cef-bb71-7e98ffd9cffd
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
alexandernegri.hopto.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 2548 tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exepid process 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription pid process target process PID 3056 set thread context of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2420 schtasks.exe 2004 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2868 timeout.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exepid process 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exepid process 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe Token: SeDebugPrivilege 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.execmd.exe484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.execmd.exedescription pid process target process PID 3056 wrote to memory of 3044 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 3044 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 3044 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 3044 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3044 wrote to memory of 2632 3044 cmd.exe reg.exe PID 3044 wrote to memory of 2632 3044 cmd.exe reg.exe PID 3044 wrote to memory of 2632 3044 cmd.exe reg.exe PID 3044 wrote to memory of 2632 3044 cmd.exe reg.exe PID 3056 wrote to memory of 2548 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe tmp.exe PID 3056 wrote to memory of 2548 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe tmp.exe PID 3056 wrote to memory of 2548 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe tmp.exe PID 3056 wrote to memory of 2548 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe tmp.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 3056 wrote to memory of 2736 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe PID 2736 wrote to memory of 2420 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2420 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2420 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2420 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 3056 wrote to memory of 2144 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 2144 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 2144 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 3056 wrote to memory of 2144 3056 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe cmd.exe PID 2144 wrote to memory of 2868 2144 cmd.exe timeout.exe PID 2144 wrote to memory of 2868 2144 cmd.exe timeout.exe PID 2144 wrote to memory of 2868 2144 cmd.exe timeout.exe PID 2144 wrote to memory of 2868 2144 cmd.exe timeout.exe PID 2736 wrote to memory of 2004 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2004 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2004 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe PID 2736 wrote to memory of 2004 2736 484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\484e27072482dbdaad8dc5ba3b42ee02_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp39A6.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3A43.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp39A6.tmpFilesize
1KB
MD5ab1bdedf35a82e7d9ad05f87c81e63bc
SHA1cdf75718dfd405b3ede7b04619733a5b36004ef8
SHA2564c7e04b43a233fe219f029de35afbf8cb3dd84a8cc0f4af86271892f3c9add8d
SHA512109c4521f1903f3c7dc53aaa30c861b82b39c9d4b1122a3cf4acc3cbbcf660cecbeea31f60c02b2845d629ae658b34c45681cf2228cd686fd8254f194f65cdd6
-
C:\Users\Admin\AppData\Local\Temp\tmp3A43.tmpFilesize
1KB
MD54b7ef560289c0f62d0baf6f14f48a57a
SHA18331acb90dde588aa3196919f6e847f398fd06d1
SHA256062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207
SHA512ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8
-
C:\Users\Admin\AppData\Roaming\FolderN\name.exeFilesize
1.1MB
MD5484e27072482dbdaad8dc5ba3b42ee02
SHA14ee146db76435dd8db6678b0a3b1c1e6d167469e
SHA2568feb48eae4ca6d55b2d5ad244917791ba9129f821b92d451dd7f02c64b3b5541
SHA5125fd696e79a62b2caf8ea939ed77c8175f6bdf7bd5a316011e7aaf0cba81683669d9fe7197a3d740e9a196dd0143831864ba13725f0260f3892403db264955668
-
C:\Users\Admin\AppData\Roaming\FolderN\name.exe.batFilesize
189B
MD5dca86f6bec779bba1b58d992319e88db
SHA1844e656d3603d15ae56f36298f8031ad52935829
SHA256413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743
SHA5124b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c
-
\Users\Admin\AppData\Roaming\tmp.exeFilesize
203KB
MD5ea4e711b570883a5f601e3c134b4d666
SHA14845379009f04bb888e3194ddc613e57fccb5999
SHA256d5a68669dcc8d060b385202713a80a79eb068dc78a78cdb5a912ddfa12820ba1
SHA512e8f80eef1a303d72160d55d93870fd2ce24f8632b06af3adadcc0d5b5804d5dee44eb72889b39fe72e4688a0d3d064c6e632631bb570f912178e2872ce6fe102
-
memory/2548-19-0x000007FEF61DE000-0x000007FEF61DF000-memory.dmpFilesize
4KB
-
memory/2548-34-0x000007FEF5F20000-0x000007FEF68BD000-memory.dmpFilesize
9.6MB
-
memory/2548-49-0x000007FEF5F20000-0x000007FEF68BD000-memory.dmpFilesize
9.6MB
-
memory/2548-43-0x000007FEF5F20000-0x000007FEF68BD000-memory.dmpFilesize
9.6MB
-
memory/2736-31-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-20-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-30-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2736-24-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-29-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-26-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2736-22-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/3056-0-0x0000000074D11000-0x0000000074D12000-memory.dmpFilesize
4KB
-
memory/3056-1-0x0000000074D10000-0x00000000752BB000-memory.dmpFilesize
5.7MB
-
memory/3056-2-0x0000000074D10000-0x00000000752BB000-memory.dmpFilesize
5.7MB
-
memory/3056-50-0x0000000074D10000-0x00000000752BB000-memory.dmpFilesize
5.7MB
-
memory/3056-51-0x0000000074D10000-0x00000000752BB000-memory.dmpFilesize
5.7MB