Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps1
Resource
win7-20240508-en
General
-
Target
5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps1
-
Size
1.9MB
-
MD5
5c2d7400b58b55608069873d3d5af238
-
SHA1
e6b6eed95f5cce0cb216a12d0b70d5496b188e7a
-
SHA256
0a2e69cd10d7e9eda91c498e93c961216b327a159a509d447992e6dd91a99e79
-
SHA512
650bdff5bf8083295de8ddae51af366a1c4f45851b94cc2142e110a53c3088348d083e3b55203967b1e48a51d4ef791564288d1cba290c0b77b5d6e874a417e9
-
SSDEEP
24576:ItozzyOXedxWtj6ruc+NWPl+yasPEKBG62FA3ExHEsINw8nhzdNvLPKMFfNehSG2:POnG6JB8sG62tGrnDNzPFfSN2
Malware Config
Extracted
nanocore
1.2.2.0
tomcoyne.duckdns.org:482
160.202.163.245:482
b7010afc-188d-4cb1-b171-bd2182d2dc29
-
activate_away_mode
true
-
backup_connection_host
160.202.163.245
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-02-21T16:53:39.600822436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
482
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b7010afc-188d-4cb1-b171-bd2182d2dc29
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
tomcoyne.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bwfs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation bwfs.exe -
Executes dropped EXE 1 IoCs
Processes:
bwfs.exepid process 4440 bwfs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Public\bwfs.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bwfs.exedescription pid process target process PID 4440 set thread context of 3620 4440 bwfs.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
powershell.exebwfs.exeRegSvcs.exepid process 1504 powershell.exe 1504 powershell.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 3620 RegSvcs.exe 3620 RegSvcs.exe 3620 RegSvcs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 3620 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bwfs.exepid process 4440 bwfs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1504 powershell.exe Token: SeDebugPrivilege 3620 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
bwfs.exepid process 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
bwfs.exepid process 4440 bwfs.exe 4440 bwfs.exe 4440 bwfs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
powershell.exebwfs.exedescription pid process target process PID 1504 wrote to memory of 4440 1504 powershell.exe bwfs.exe PID 1504 wrote to memory of 4440 1504 powershell.exe bwfs.exe PID 1504 wrote to memory of 4440 1504 powershell.exe bwfs.exe PID 4440 wrote to memory of 1036 4440 bwfs.exe cmd.exe PID 4440 wrote to memory of 1036 4440 bwfs.exe cmd.exe PID 4440 wrote to memory of 1036 4440 bwfs.exe cmd.exe PID 4440 wrote to memory of 3620 4440 bwfs.exe RegSvcs.exe PID 4440 wrote to memory of 3620 4440 bwfs.exe RegSvcs.exe PID 4440 wrote to memory of 3620 4440 bwfs.exe RegSvcs.exe PID 4440 wrote to memory of 3620 4440 bwfs.exe RegSvcs.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\5c2d7400b58b55608069873d3d5af238_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\bwfs.exe"C:\Users\Public\bwfs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy "C:\Users\Public\bwfs.exe" "C:\Users\Admin\AppData\Roaming\WebCache\AudioEng.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_05b5jum5.ah5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Public\bwfs.exeFilesize
1.4MB
MD5cfe3e97746dd210830f57876ad71e566
SHA18b3afdb5d5e75638d711274596f9c99e265dffec
SHA25632ad676064d22ecf50d32820a7339f76d44cb34f136d748ee2c3d903a39bf054
SHA51257f74fb6f0bd476413b8328e16fd418e9a9978eb048a921fb12906599c82ee8d392659ca116c4063e01ed02e436f6d289be905468baf16259fa5b69fd235a6cd
-
memory/1504-0-0x00007FFF04093000-0x00007FFF04095000-memory.dmpFilesize
8KB
-
memory/1504-2-0x000001807C9F0000-0x000001807CA12000-memory.dmpFilesize
136KB
-
memory/1504-11-0x00007FFF04090000-0x00007FFF04B51000-memory.dmpFilesize
10.8MB
-
memory/1504-12-0x00007FFF04090000-0x00007FFF04B51000-memory.dmpFilesize
10.8MB
-
memory/1504-19-0x00007FFF04090000-0x00007FFF04B51000-memory.dmpFilesize
10.8MB
-
memory/3620-23-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/3620-25-0x0000000001600000-0x0000000001610000-memory.dmpFilesize
64KB
-
memory/3620-28-0x0000000001600000-0x0000000001610000-memory.dmpFilesize
64KB
-
memory/4440-24-0x00000000013C0000-0x00000000013C3000-memory.dmpFilesize
12KB
-
memory/4440-27-0x00000000013C0000-0x00000000013C3000-memory.dmpFilesize
12KB