Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe
-
Size
852KB
-
MD5
53b6adccfa92bc14352aec7289ab2950
-
SHA1
6067cca668cfb9ac87441cf0156af321202f2d04
-
SHA256
c5fa6b9642b737e1318245b039002b26141092ca9d055bc99f9250c1ea91b966
-
SHA512
883965f9d5aff1f8b137b063e7fc6e978ba8805bb4769d112a87d04c4858f2e1e397da19884a45b0723671357484b781dc2be2f294838d30a717a3f74afde5f3
-
SSDEEP
24576:L2O/GlmnhDKoc9JT3Q0cKvkw7+2qJ787g6zwm4m53Sb2n:P5KRT3Q0cKvkwS2Q785kFm53Syn
Malware Config
Extracted
nanocore
1.2.2.0
154.16.63.21:8777
e8ddcb63-1ab8-4f2b-8233-40ab2aa77e6c
-
activate_away_mode
true
-
backup_connection_host
154.16.63.21
- backup_dns_server
-
buffer_size
65535
-
build_time
2017-01-13T08:26:18.817282736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
8777
-
default_group
uk
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
e8ddcb63-1ab8-4f2b-8233-40ab2aa77e6c
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
154.16.63.21
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
fqx.exefqx.exepid process 1776 fqx.exe 2084 fqx.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
fqx.exeRegSvcs.exeRegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\khc\\fqx.exe C:\\Users\\Admin\\AppData\\Roaming\\khc\\anm-tjs" fqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\khc\\fqx.exe C:\\Users\\Admin\\AppData\\Roaming\\khc\\anm-tjs" RegSvcs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fqx.exedescription pid process target process PID 2084 set thread context of 2940 2084 fqx.exe RegSvcs.exe PID 2084 set thread context of 1708 2084 fqx.exe RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Program Files (x86)\DDP Host\ddphost.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fqx.exeRegSvcs.exeRegSvcs.exepid process 1776 fqx.exe 1776 fqx.exe 2940 RegSvcs.exe 2940 RegSvcs.exe 2940 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe 1708 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 2940 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2940 RegSvcs.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exefqx.exefqx.exedescription pid process target process PID 4488 wrote to memory of 1776 4488 53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe fqx.exe PID 4488 wrote to memory of 1776 4488 53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe fqx.exe PID 4488 wrote to memory of 1776 4488 53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe fqx.exe PID 1776 wrote to memory of 2084 1776 fqx.exe fqx.exe PID 1776 wrote to memory of 2084 1776 fqx.exe fqx.exe PID 1776 wrote to memory of 2084 1776 fqx.exe fqx.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 2940 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 1708 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 1708 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 1708 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 1708 2084 fqx.exe RegSvcs.exe PID 2084 wrote to memory of 1708 2084 fqx.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53b6adccfa92bc14352aec7289ab2950_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\khc\fqx.exe"C:\Users\Admin\AppData\Roaming\khc\fqx.exe" anm-tjs2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\khc\fqx.exeC:\Users\Admin\AppData\Roaming\khc\fqx.exe C:\Users\Admin\AppData\Roaming\khc\ITCWJ3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeC:\Users\Admin\AppData\Roaming\khc\ITCWJ4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\khc\ITCWJFilesize
91KB
MD5e75f7afd6c1fc384fae32f662a3c5939
SHA1920548e0c819204b114267a1ac5198eb01d2eb43
SHA25681b7d64bf1736312351fd0207fde3e2c23aa3231607415748ec51c01c377a17a
SHA512ec1741b87dc453c3e0d91a77f00bf2830445176b8b4ee80722f2c4e6bb53b5a7675a2c8f70274a737023906fa325bc150d10a58688b498c03d0e6a4de1765859
-
C:\Users\Admin\AppData\Roaming\khc\anm-tjsFilesize
7.4MB
MD56276212be5f4f3dc51113b6bff9a4cb4
SHA1b26e74f82e1fa09a8c332ab39505be5f6efabab0
SHA25674f704dbe98256359a2593e0883a79152b1c61271405685384a94b12858261c8
SHA5128b9bd50aff0c896dd587a413162054d8f887426784eaa9fbc09023ce12421cff31ba63378b45bc75f0a3e556a42d18d7c206b16605f8c870a9fce54d5b2b5ceb
-
C:\Users\Admin\AppData\Roaming\khc\faa.bmpFilesize
618KB
MD5a337884da35ac1afc9cb434fd4b0cd9e
SHA1f9d1935c8cfc8b697c40fa6da71bd950129bef0d
SHA256d5f05d19ae26abc515edbd0b1328d73c0a43a9b577fbed041b640d49d9b0320c
SHA5121bddd5d445ec89186043bdabe42f9817ea999eaed702dcc7fab1bec50a8e879ae0f12e706770091644912cd1e7de6f389b396c8af05f8e78a71f4005f9485e4e
-
C:\Users\Admin\AppData\Roaming\khc\fqx.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\khc\spdFilesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
memory/1708-95-0x0000000000D00000-0x0000000000DCC000-memory.dmpFilesize
816KB
-
memory/1708-98-0x0000000000D00000-0x0000000000DCC000-memory.dmpFilesize
816KB
-
memory/2940-93-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB