Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps1
Resource
win7-20240508-en
General
-
Target
5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps1
-
Size
1.9MB
-
MD5
5c2d7400b58b55608069873d3d5af238
-
SHA1
e6b6eed95f5cce0cb216a12d0b70d5496b188e7a
-
SHA256
0a2e69cd10d7e9eda91c498e93c961216b327a159a509d447992e6dd91a99e79
-
SHA512
650bdff5bf8083295de8ddae51af366a1c4f45851b94cc2142e110a53c3088348d083e3b55203967b1e48a51d4ef791564288d1cba290c0b77b5d6e874a417e9
-
SSDEEP
24576:ItozzyOXedxWtj6ruc+NWPl+yasPEKBG62FA3ExHEsINw8nhzdNvLPKMFfNehSG2:POnG6JB8sG62tGrnDNzPFfSN2
Malware Config
Extracted
nanocore
1.2.2.0
tomcoyne.duckdns.org:482
160.202.163.245:482
b7010afc-188d-4cb1-b171-bd2182d2dc29
-
activate_away_mode
true
-
backup_connection_host
160.202.163.245
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-02-21T16:53:39.600822436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
482
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b7010afc-188d-4cb1-b171-bd2182d2dc29
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
tomcoyne.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mwr.exepid process 2624 mwr.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Public\mwr.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mwr.exedescription pid process target process PID 2624 set thread context of 1148 2624 mwr.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exemwr.exeRegSvcs.exepid process 2132 powershell.exe 2624 mwr.exe 2624 mwr.exe 1148 RegSvcs.exe 1148 RegSvcs.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 1148 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
mwr.exepid process 2624 mwr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 1148 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
mwr.exepid process 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
mwr.exepid process 2624 mwr.exe 2624 mwr.exe 2624 mwr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
powershell.exemwr.exedescription pid process target process PID 2132 wrote to memory of 2624 2132 powershell.exe mwr.exe PID 2132 wrote to memory of 2624 2132 powershell.exe mwr.exe PID 2132 wrote to memory of 2624 2132 powershell.exe mwr.exe PID 2132 wrote to memory of 2624 2132 powershell.exe mwr.exe PID 2624 wrote to memory of 2792 2624 mwr.exe cmd.exe PID 2624 wrote to memory of 2792 2624 mwr.exe cmd.exe PID 2624 wrote to memory of 2792 2624 mwr.exe cmd.exe PID 2624 wrote to memory of 2792 2624 mwr.exe cmd.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe PID 2624 wrote to memory of 1148 2624 mwr.exe RegSvcs.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\mwr.exe"C:\Users\Public\mwr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy "C:\Users\Public\mwr.exe" "C:\Users\Admin\AppData\Roaming\WebCache\AudioEng.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WebCache\AudioEng.exeFilesize
1.4MB
MD5c87734546cd353214dd3c6d0761db2c3
SHA10d35fe29767037ca732f903a539b2e133c04a013
SHA2565a8b4063ff67e4f30ad132212499558c9ecfe65e5c8daacb00759bef0a56bd4b
SHA5124e62b148a7d84dfb23cc01e90ceebea64394dff5530cab5bf77546ca1eb6d6b28265cfac70073fa627cc492527fd7db22931f484f885d54c6f3f3cbf66fea48a
-
C:\Users\Public\mwr.exeFilesize
1.4MB
MD5cfe3e97746dd210830f57876ad71e566
SHA18b3afdb5d5e75638d711274596f9c99e265dffec
SHA25632ad676064d22ecf50d32820a7339f76d44cb34f136d748ee2c3d903a39bf054
SHA51257f74fb6f0bd476413b8328e16fd418e9a9978eb048a921fb12906599c82ee8d392659ca116c4063e01ed02e436f6d289be905468baf16259fa5b69fd235a6cd
-
memory/1148-26-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1148-22-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1148-24-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2132-10-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-4-0x000007FEF592E000-0x000007FEF592F000-memory.dmpFilesize
4KB
-
memory/2132-11-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-8-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-17-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-9-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-7-0x000007FEF5670000-0x000007FEF600D000-memory.dmpFilesize
9.6MB
-
memory/2132-5-0x000000001B590000-0x000000001B872000-memory.dmpFilesize
2.9MB
-
memory/2132-6-0x00000000026E0000-0x00000000026E8000-memory.dmpFilesize
32KB
-
memory/2624-21-0x0000000000AE0000-0x0000000000AE3000-memory.dmpFilesize
12KB