Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 23:19

General

  • Target

    50333dad192d9888ce17fa31bd466256JaffaCakes118.exe

  • Size

    463KB

  • MD5

    50333dad192d9888ce17fa31bd466256

  • SHA1

    0e13f68a360abd1e3e2f8e3601ed0bf1641196f0

  • SHA256

    875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4

  • SHA512

    c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

  • SSDEEP

    6144:cbiYCMinOZCVn3PzN2bZB8gpqECIm0ROn49SY851EkTH6z26nGgvkfA77juvpMh2:AWMQtJ32qEZRzSYWvzlPfA7Xu

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Registers new Print Monitor 2 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 8000
          4⤵
          • Runs ping.exe
          PID:3216
        • C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
          C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
            "C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"
            5⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
    • Registers new Print Monitor
    • Checks SCSI registry key(s)
    • Modifies data under HKEY_USERS
    PID:4592

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe.log
    Filesize

    128B

    MD5

    a5dcc7c9c08af7dddd82be5b036a4416

    SHA1

    4f998ca1526d199e355ffb435bae111a2779b994

    SHA256

    e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5

    SHA512

    56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe
    Filesize

    52KB

    MD5

    a64daca3cfbcd039df3ec29d3eddd001

    SHA1

    eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3

    SHA256

    403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36

    SHA512

    b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

  • C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
    Filesize

    463KB

    MD5

    50333dad192d9888ce17fa31bd466256

    SHA1

    0e13f68a360abd1e3e2f8e3601ed0bf1641196f0

    SHA256

    875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4

    SHA512

    c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

  • memory/2276-11-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/2276-7-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/2276-8-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/2276-6-0x0000000000400000-0x0000000000446000-memory.dmp
    Filesize

    280KB

  • memory/3452-0-0x00000000751B2000-0x00000000751B3000-memory.dmp
    Filesize

    4KB

  • memory/3452-2-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/3452-1-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/3452-23-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/4612-15-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/4612-16-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/4612-17-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB

  • memory/4612-26-0x00000000751B0000-0x0000000075761000-memory.dmp
    Filesize

    5.7MB