Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe
-
Size
440KB
-
MD5
5b169b166b37a1632dfdb10b4807b4a8
-
SHA1
63bf09962309e211541569e58b33b1a001630cf3
-
SHA256
2816241bc95bb7ed310224e6f8597d6665f98a51ac4a17d2372c427aa9b0cf68
-
SHA512
ddf01a34d6a0bfceaf03c90f40029642f5b102c9f0131ad77ba8fdbcbc6e4c909aeb82bb9da1cd8cd71d9f127d0cdb74f199ea5684afcdbe885eddeb2a7ac08f
-
SSDEEP
6144:DkSAGzXgIpx7HPeLQghR8XNwdF3oseTbKAF0JiGVg/w:DkSpxe9hRmNwdcbKQ0n5
Malware Config
Extracted
nanocore
1.2.2.0
bornsinner.myq-see.com:3941
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65542
-
build_time
2020-02-03T06:34:44.711604836Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
3994
-
connection_port
3941
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1276c0d6-7944-4dc2-bd80-b50fc12f063d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
bornsinner.myq-see.com
-
primary_dns_server
bornsinner.myq-see.com
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exedescription pid process target process PID 3972 set thread context of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3248 schtasks.exe 4972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exe5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exepid process 752 powershell.exe 752 powershell.exe 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe 1284 RegSvcs.exe 1284 RegSvcs.exe 1284 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 1284 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 752 powershell.exe Token: SeDebugPrivilege 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe Token: SeDebugPrivilege 1284 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exeRegSvcs.exedescription pid process target process PID 3972 wrote to memory of 752 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 3972 wrote to memory of 752 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 3972 wrote to memory of 752 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe powershell.exe PID 3972 wrote to memory of 3248 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 3972 wrote to memory of 3248 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 3972 wrote to memory of 3248 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe schtasks.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 3972 wrote to memory of 1284 3972 5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe RegSvcs.exe PID 1284 wrote to memory of 4972 1284 RegSvcs.exe schtasks.exe PID 1284 wrote to memory of 4972 1284 RegSvcs.exe schtasks.exe PID 1284 wrote to memory of 4972 1284 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b169b166b37a1632dfdb10b4807b4a8_JaffaCakes118.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bKXKhtysqSdsa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5AE1.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DPI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp5E8B.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xbvv05td.vl0.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp5AE1.tmpFilesize
1KB
MD5ba384db1c404d2d77dab4477bf81ae30
SHA181a46ae99344843a7159cc099da25c2479b29d98
SHA25654590e0997d2a1ce867769750115ed414b7341687680f65ee03fda2c1afbe4ca
SHA512ae7e26b4963b0146b806602e5784368d4e74affef103dd1d09265ddf1f09ca8f1d2b0ec37fec1333269d8924e3d07a553dd1fd049cf2b43270d54c419f669ba9
-
C:\Users\Admin\AppData\Local\Temp\tmp5E8B.tmpFilesize
1KB
MD540b11ef601fb28f9b2e69d36857bf2ec
SHA1b6454020ad2ceed193f4792b77001d0bd741b370
SHA256c51e12d18cc664425f6711d8ae2507068884c7057092cfa11884100e1e9d49e1
SHA512e3c5bcc714cbfca4b8058ddcddf231dcefa69c15881ce3f8123e59ed45cfb5da052b56e1945dcf8dc7f800d62f9a4eecb82bca69a66a1530787aeffeb15e2bd5
-
memory/752-36-0x00000000070F0000-0x0000000007193000-memory.dmpFilesize
652KB
-
memory/752-5-0x00000000722F0000-0x0000000072AA0000-memory.dmpFilesize
7.7MB
-
memory/752-35-0x0000000006680000-0x000000000669E000-memory.dmpFilesize
120KB
-
memory/752-34-0x00000000722F0000-0x0000000072AA0000-memory.dmpFilesize
7.7MB
-
memory/752-7-0x00000000722F0000-0x0000000072AA0000-memory.dmpFilesize
7.7MB
-
memory/752-8-0x00000000051A0000-0x00000000051C2000-memory.dmpFilesize
136KB
-
memory/752-9-0x0000000005A00000-0x0000000005A66000-memory.dmpFilesize
408KB
-
memory/752-10-0x0000000005A70000-0x0000000005AD6000-memory.dmpFilesize
408KB
-
memory/752-3-0x00000000722FE000-0x00000000722FF000-memory.dmpFilesize
4KB
-
memory/752-20-0x0000000005BE0000-0x0000000005F34000-memory.dmpFilesize
3.3MB
-
memory/752-21-0x00000000060C0000-0x00000000060DE000-memory.dmpFilesize
120KB
-
memory/752-22-0x00000000060F0000-0x000000000613C000-memory.dmpFilesize
304KB
-
memory/752-23-0x00000000070B0000-0x00000000070E2000-memory.dmpFilesize
200KB
-
memory/752-24-0x000000006E770000-0x000000006E7BC000-memory.dmpFilesize
304KB
-
memory/752-37-0x00000000722F0000-0x0000000072AA0000-memory.dmpFilesize
7.7MB
-
memory/752-49-0x00000000722F0000-0x0000000072AA0000-memory.dmpFilesize
7.7MB
-
memory/752-6-0x00000000051E0000-0x0000000005808000-memory.dmpFilesize
6.2MB
-
memory/752-39-0x0000000007400000-0x000000000741A000-memory.dmpFilesize
104KB
-
memory/752-4-0x0000000004B70000-0x0000000004BA6000-memory.dmpFilesize
216KB
-
memory/752-38-0x0000000007A50000-0x00000000080CA000-memory.dmpFilesize
6.5MB
-
memory/752-40-0x0000000004E20000-0x0000000004E2A000-memory.dmpFilesize
40KB
-
memory/752-41-0x00000000076A0000-0x0000000007736000-memory.dmpFilesize
600KB
-
memory/752-42-0x0000000007620000-0x0000000007631000-memory.dmpFilesize
68KB
-
memory/752-43-0x0000000007650000-0x000000000765E000-memory.dmpFilesize
56KB
-
memory/752-44-0x0000000007660000-0x0000000007674000-memory.dmpFilesize
80KB
-
memory/752-45-0x0000000007760000-0x000000000777A000-memory.dmpFilesize
104KB
-
memory/752-46-0x0000000007740000-0x0000000007748000-memory.dmpFilesize
32KB
-
memory/1284-55-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1284-59-0x0000000074840000-0x0000000074DF1000-memory.dmpFilesize
5.7MB
-
memory/1284-57-0x0000000074842000-0x0000000074843000-memory.dmpFilesize
4KB
-
memory/1284-64-0x0000000074840000-0x0000000074DF1000-memory.dmpFilesize
5.7MB
-
memory/1284-65-0x0000000074842000-0x0000000074843000-memory.dmpFilesize
4KB
-
memory/3972-0-0x0000000074842000-0x0000000074843000-memory.dmpFilesize
4KB
-
memory/3972-2-0x0000000074840000-0x0000000074DF1000-memory.dmpFilesize
5.7MB
-
memory/3972-58-0x0000000074840000-0x0000000074DF1000-memory.dmpFilesize
5.7MB
-
memory/3972-1-0x0000000074840000-0x0000000074DF1000-memory.dmpFilesize
5.7MB