Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe
-
Size
459KB
-
MD5
5d543ec7dc016ed07039f97fae98d723
-
SHA1
32333a9457b20982a8ea385d8af9acf10ede321e
-
SHA256
612c55d50423f24426425d329e98cc87ec55c5631450f8338acfe8c7b6f69081
-
SHA512
7678a9e8390ca762eb61cbfa70ab9661ac950da3434f5497a90c41b4b81f733ad2f6a406797a50ac87b09b37538c0d9c8df1bf42777c3244cff8bf3af37cc5d5
-
SSDEEP
6144:SPNS/+PNS/ASEoViis3eho5HvAcYOADQyboSMsccL3K0:SPPPHy8iwAcUbba
Malware Config
Extracted
nanocore
1.2.2.0
160.202.163.246:1011
be4bba96-32ef-41bb-8e65-218c74deb597
-
activate_away_mode
false
-
backup_connection_host
160.202.163.246
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-07-26T18:51:07.558259536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1011
-
default_group
Heart Of Gold
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
be4bba96-32ef-41bb-8e65-218c74deb597
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
160.202.163.246
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.lnk app.exe -
Executes dropped EXE 2 IoCs
pid Process 2012 app.exe 2672 app.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 cmd.exe 2012 app.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Host = "C:\\Program Files (x86)\\NAS Host\\nashost.exe" app.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA app.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 2672 2012 app.exe 35 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAS Host\nashost.exe app.exe File opened for modification C:\Program Files (x86)\NAS Host\nashost.exe app.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe 2500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 app.exe 2672 app.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 app.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe Token: SeDebugPrivilege 2012 app.exe Token: SeDebugPrivilege 2672 app.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2236 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 28 PID 1956 wrote to memory of 2236 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 28 PID 1956 wrote to memory of 2236 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 28 PID 1956 wrote to memory of 2236 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 28 PID 1956 wrote to memory of 2712 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2712 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2712 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2712 1956 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe 30 PID 2712 wrote to memory of 2012 2712 cmd.exe 32 PID 2712 wrote to memory of 2012 2712 cmd.exe 32 PID 2712 wrote to memory of 2012 2712 cmd.exe 32 PID 2712 wrote to memory of 2012 2712 cmd.exe 32 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2012 wrote to memory of 2672 2012 app.exe 35 PID 2672 wrote to memory of 2620 2672 app.exe 36 PID 2672 wrote to memory of 2620 2672 app.exe 36 PID 2672 wrote to memory of 2620 2672 app.exe 36 PID 2672 wrote to memory of 2620 2672 app.exe 36 PID 2672 wrote to memory of 2500 2672 app.exe 38 PID 2672 wrote to memory of 2500 2672 app.exe 38 PID 2672 wrote to memory of 2500 2672 app.exe 38 PID 2672 wrote to memory of 2500 2672 app.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"2⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp566A.tmp"5⤵
- Creates scheduled task(s)
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAS Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp56C8.tmp"5⤵
- Creates scheduled task(s)
PID:2500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ee6d332673c44b281867ff9c44ae458
SHA1ef6511f3b039ab45c5ae6e1ac9f1c542c00fcc88
SHA25680fc896a358535a0a11f16471a1f5a8059bdd47150647151a7d6f2a67a765bbe
SHA51269b91ace7419030509a451807fc0812ef2804f0c9ce140fcec7736a08ac2d0492149bcfa3ebf3107c3f88fd42c7c688fc35ea833becabe604cf00695dbc67dfa
-
Filesize
1KB
MD59f554f602c22cfc20079e966d177fadb
SHA1789baa3425849bf239e47c6bcf352e6693a8c337
SHA2564c760d5fe0c06cf4bf554170870f41181c61a217c37eb826903094dda86dd1f1
SHA512b83e3e97dbe38ec4c64d9bef65e2521416f2d7434d78d05e66f729a2e0fbfea3f9bc6f6c4abaf76555af89a9565dfc0853d99067be9042dd66ed6246696eecbb
-
Filesize
459KB
MD55d543ec7dc016ed07039f97fae98d723
SHA132333a9457b20982a8ea385d8af9acf10ede321e
SHA256612c55d50423f24426425d329e98cc87ec55c5631450f8338acfe8c7b6f69081
SHA5127678a9e8390ca762eb61cbfa70ab9661ac950da3434f5497a90c41b4b81f733ad2f6a406797a50ac87b09b37538c0d9c8df1bf42777c3244cff8bf3af37cc5d5