Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
-
Size
440KB
-
MD5
5b169b166b37a1632dfdb10b4807b4a8
-
SHA1
63bf09962309e211541569e58b33b1a001630cf3
-
SHA256
2816241bc95bb7ed310224e6f8597d6665f98a51ac4a17d2372c427aa9b0cf68
-
SHA512
ddf01a34d6a0bfceaf03c90f40029642f5b102c9f0131ad77ba8fdbcbc6e4c909aeb82bb9da1cd8cd71d9f127d0cdb74f199ea5684afcdbe885eddeb2a7ac08f
-
SSDEEP
6144:DkSAGzXgIpx7HPeLQghR8XNwdF3oseTbKAF0JiGVg/w:DkSpxe9hRmNwdcbKQ0n5
Malware Config
Extracted
nanocore
1.2.2.0
bornsinner.myq-see.com:3941
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65542
-
build_time
2020-02-03T06:34:44.711604836Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
3994
-
connection_port
3941
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
bornsinner.myq-see.com
-
primary_dns_server
bornsinner.myq-see.com
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2680 schtasks.exe 1904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3040 powershell.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 2856 RegSvcs.exe 2856 RegSvcs.exe 2856 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Token: SeDebugPrivilege 2856 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 28 PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 28 PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 28 PID 1936 wrote to memory of 3040 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2680 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2564 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 32 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 1936 wrote to memory of 2856 1936 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 33 PID 2856 wrote to memory of 1904 2856 RegSvcs.exe 34 PID 2856 wrote to memory of 1904 2856 RegSvcs.exe 34 PID 2856 wrote to memory of 1904 2856 RegSvcs.exe 34 PID 2856 wrote to memory of 1904 2856 RegSvcs.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bKXKhtysqSdsa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1304.tmp"2⤵
- Creates scheduled task(s)
PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵PID:2564
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp14E8.tmp"3⤵
- Creates scheduled task(s)
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561967f64a955abf073203d954c7264c5
SHA1ea05d5b0e7fedc52a26e08eff80c779b1054be09
SHA2560e095f1ba173425b7e280bffb6f1ffe87585af71e4bf5d133aadd54c47688c4d
SHA51274c1ad5740d2533c5935dc850a895a0dd7fd170c4d3cf0e9ba3981f4477a4052593c8289ef2941c397693b6446ff7effaf6c94288e3e419a0282344437236023
-
Filesize
1KB
MD540b11ef601fb28f9b2e69d36857bf2ec
SHA1b6454020ad2ceed193f4792b77001d0bd741b370
SHA256c51e12d18cc664425f6711d8ae2507068884c7057092cfa11884100e1e9d49e1
SHA512e3c5bcc714cbfca4b8058ddcddf231dcefa69c15881ce3f8123e59ed45cfb5da052b56e1945dcf8dc7f800d62f9a4eecb82bca69a66a1530787aeffeb15e2bd5