Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
-
Size
440KB
-
MD5
5b169b166b37a1632dfdb10b4807b4a8
-
SHA1
63bf09962309e211541569e58b33b1a001630cf3
-
SHA256
2816241bc95bb7ed310224e6f8597d6665f98a51ac4a17d2372c427aa9b0cf68
-
SHA512
ddf01a34d6a0bfceaf03c90f40029642f5b102c9f0131ad77ba8fdbcbc6e4c909aeb82bb9da1cd8cd71d9f127d0cdb74f199ea5684afcdbe885eddeb2a7ac08f
-
SSDEEP
6144:DkSAGzXgIpx7HPeLQghR8XNwdF3oseTbKAF0JiGVg/w:DkSpxe9hRmNwdcbKQ0n5
Malware Config
Extracted
nanocore
1.2.2.0
bornsinner.myq-see.com:3941
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65542
-
build_time
2020-02-03T06:34:44.711604836Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
3994
-
connection_port
3941
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
bornsinner.myq-see.com
-
primary_dns_server
bornsinner.myq-see.com
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription pid process target process PID 1936 set thread context of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2680 schtasks.exe 1904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exe5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exepid process 3040 powershell.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 2856 RegSvcs.exe 2856 RegSvcs.exe 2856 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 2856 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Token: SeDebugPrivilege 2856 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exedescription pid process target process PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 2856 wrote to memory of 1904 2856 RegSvcs.exe schtasks.exe PID 2856 wrote to memory of 1904 2856 RegSvcs.exe schtasks.exe PID 2856 wrote to memory of 1904 2856 RegSvcs.exe schtasks.exe PID 2856 wrote to memory of 1904 2856 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bKXKhtysqSdsa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1304.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp14E8.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1304.tmpFilesize
1KB
MD561967f64a955abf073203d954c7264c5
SHA1ea05d5b0e7fedc52a26e08eff80c779b1054be09
SHA2560e095f1ba173425b7e280bffb6f1ffe87585af71e4bf5d133aadd54c47688c4d
SHA51274c1ad5740d2533c5935dc850a895a0dd7fd170c4d3cf0e9ba3981f4477a4052593c8289ef2941c397693b6446ff7effaf6c94288e3e419a0282344437236023
-
C:\Users\Admin\AppData\Local\Temp\tmp14E8.tmpFilesize
1KB
MD540b11ef601fb28f9b2e69d36857bf2ec
SHA1b6454020ad2ceed193f4792b77001d0bd741b370
SHA256c51e12d18cc664425f6711d8ae2507068884c7057092cfa11884100e1e9d49e1
SHA512e3c5bcc714cbfca4b8058ddcddf231dcefa69c15881ce3f8123e59ed45cfb5da052b56e1945dcf8dc7f800d62f9a4eecb82bca69a66a1530787aeffeb15e2bd5
-
memory/1936-1-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/1936-2-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/1936-29-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/1936-0-0x0000000074AD1000-0x0000000074AD2000-memory.dmpFilesize
4KB
-
memory/1936-28-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/2856-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2856-25-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-18-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-27-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-26-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-16-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-20-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2856-22-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/3040-7-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/3040-10-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/3040-8-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/3040-9-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/3040-6-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB
-
memory/3040-5-0x0000000074AD0000-0x000000007507B000-memory.dmpFilesize
5.7MB