Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe
-
Size
459KB
-
MD5
5d543ec7dc016ed07039f97fae98d723
-
SHA1
32333a9457b20982a8ea385d8af9acf10ede321e
-
SHA256
612c55d50423f24426425d329e98cc87ec55c5631450f8338acfe8c7b6f69081
-
SHA512
7678a9e8390ca762eb61cbfa70ab9661ac950da3434f5497a90c41b4b81f733ad2f6a406797a50ac87b09b37538c0d9c8df1bf42777c3244cff8bf3af37cc5d5
-
SSDEEP
6144:SPNS/+PNS/ASEoViis3eho5HvAcYOADQyboSMsccL3K0:SPPPHy8iwAcUbba
Malware Config
Extracted
nanocore
1.2.2.0
160.202.163.246:1011
be4bba96-32ef-41bb-8e65-218c74deb597
-
activate_away_mode
false
-
backup_connection_host
160.202.163.246
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-07-26T18:51:07.558259536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1011
-
default_group
Heart Of Gold
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
be4bba96-32ef-41bb-8e65-218c74deb597
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
160.202.163.246
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe -
Drops startup file 1 IoCs
Processes:
app.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.lnk app.exe -
Executes dropped EXE 2 IoCs
Processes:
app.exeapp.exepid process 3172 app.exe 4904 app.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
app.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" app.exe -
Processes:
app.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA app.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
app.exedescription pid process target process PID 3172 set thread context of 4904 3172 app.exe app.exe -
Drops file in Program Files directory 2 IoCs
Processes:
app.exedescription ioc process File created C:\Program Files (x86)\DDP Host\ddphost.exe app.exe File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe app.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4456 schtasks.exe 1724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
app.exepid process 4904 app.exe 4904 app.exe 4904 app.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
app.exepid process 4904 app.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exeapp.exeapp.exedescription pid process Token: SeDebugPrivilege 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe Token: SeDebugPrivilege 3172 app.exe Token: SeDebugPrivilege 4904 app.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.execmd.exeapp.exeapp.exedescription pid process target process PID 3364 wrote to memory of 4856 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 3364 wrote to memory of 4856 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 3364 wrote to memory of 4856 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 3364 wrote to memory of 2392 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 3364 wrote to memory of 2392 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 3364 wrote to memory of 2392 3364 5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe cmd.exe PID 2392 wrote to memory of 3172 2392 cmd.exe app.exe PID 2392 wrote to memory of 3172 2392 cmd.exe app.exe PID 2392 wrote to memory of 3172 2392 cmd.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 3172 wrote to memory of 4904 3172 app.exe app.exe PID 4904 wrote to memory of 4456 4904 app.exe schtasks.exe PID 4904 wrote to memory of 4456 4904 app.exe schtasks.exe PID 4904 wrote to memory of 4456 4904 app.exe schtasks.exe PID 4904 wrote to memory of 1724 4904 app.exe schtasks.exe PID 4904 wrote to memory of 1724 4904 app.exe schtasks.exe PID 4904 wrote to memory of 1724 4904 app.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\5d543ec7dc016ed07039f97fae98d723_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpAA74.tmp"5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpAAC3.tmp"5⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpAA74.tmpFilesize
1KB
MD56ee6d332673c44b281867ff9c44ae458
SHA1ef6511f3b039ab45c5ae6e1ac9f1c542c00fcc88
SHA25680fc896a358535a0a11f16471a1f5a8059bdd47150647151a7d6f2a67a765bbe
SHA51269b91ace7419030509a451807fc0812ef2804f0c9ce140fcec7736a08ac2d0492149bcfa3ebf3107c3f88fd42c7c688fc35ea833becabe604cf00695dbc67dfa
-
C:\Users\Admin\AppData\Local\Temp\tmpAAC3.tmpFilesize
1KB
MD52271642ca970891700e3f48439739ed8
SHA1cd472df2349f7db9e1e460d0ee28acd97b8a8793
SHA2567aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68
SHA5124669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\app.exeFilesize
459KB
MD55d543ec7dc016ed07039f97fae98d723
SHA132333a9457b20982a8ea385d8af9acf10ede321e
SHA256612c55d50423f24426425d329e98cc87ec55c5631450f8338acfe8c7b6f69081
SHA5127678a9e8390ca762eb61cbfa70ab9661ac950da3434f5497a90c41b4b81f733ad2f6a406797a50ac87b09b37538c0d9c8df1bf42777c3244cff8bf3af37cc5d5
-
memory/3172-25-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3172-20-0x0000000007410000-0x00000000074AC000-memory.dmpFilesize
624KB
-
memory/3172-18-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3172-17-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3172-16-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3364-5-0x0000000004FD0000-0x0000000004FDA000-memory.dmpFilesize
40KB
-
memory/3364-1-0x0000000000390000-0x000000000040A000-memory.dmpFilesize
488KB
-
memory/3364-10-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3364-9-0x0000000074FEE000-0x0000000074FEF000-memory.dmpFilesize
4KB
-
memory/3364-6-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3364-0-0x0000000074FEE000-0x0000000074FEF000-memory.dmpFilesize
4KB
-
memory/3364-4-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/3364-13-0x0000000074FE0000-0x0000000075790000-memory.dmpFilesize
7.7MB
-
memory/3364-3-0x0000000004E40000-0x0000000004ED2000-memory.dmpFilesize
584KB
-
memory/3364-2-0x00000000053F0000-0x0000000005994000-memory.dmpFilesize
5.6MB
-
memory/4904-24-0x00000000003A0000-0x00000000003D8000-memory.dmpFilesize
224KB
-
memory/4904-33-0x0000000004CF0000-0x0000000004CFA000-memory.dmpFilesize
40KB
-
memory/4904-34-0x0000000004FA0000-0x0000000004FBE000-memory.dmpFilesize
120KB
-
memory/4904-35-0x00000000051F0000-0x00000000051FA000-memory.dmpFilesize
40KB