Analysis Overview
SHA256
98f15ea9504c200f2a2c1eaa1ea58993dca53cf606e2d8396f20d4dd9c8c6851
Threat Level: Known bad
The file 699f37733b57e293985618ea991ce283_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
NanoCore
Nanocore family
Adds Run key to start application
Checks whether UAC is enabled
Drops file in Program Files directory
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-23 03:43
Signatures
Nanocore family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-23 03:43
Reported
2024-05-23 03:45
Platform
win7-20231129-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsv.exe" | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\TCP Service\tcpsv.exe | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Program Files (x86)\TCP Service\tcpsv.exe | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp213.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "TCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2C0.tmp"
Network
| Country | Destination | Domain | Proto |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp |
Files
memory/2412-0-0x0000000074D61000-0x0000000074D62000-memory.dmp
memory/2412-1-0x0000000074D60000-0x000000007530B000-memory.dmp
memory/2412-2-0x0000000074D60000-0x000000007530B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp213.tmp
| MD5 | 76314906fb929452f73f2c3f2a184c4d |
| SHA1 | cad5fdd266d25897c48d45a35d7115c83362b06b |
| SHA256 | c8c485133541027ccb8abf707d6e79bae690b78d87d98e1285c3903f8acc3095 |
| SHA512 | 537ce2a5f382f7145a54ba9acc48c068d451a7b601cf1dbb8dc7ff94f760cd7ee0a101bcf52e7f37d1c2b9aebd328e52bc7556f652715392db7820ad072d7fcf |
C:\Users\Admin\AppData\Local\Temp\tmp2C0.tmp
| MD5 | 93fc3117767507c9889abd12dc667d22 |
| SHA1 | 1096e4cfa0c35756e3c3fb866c1e4c1e59115df9 |
| SHA256 | 684997dd4ce15031cec8f2f93933b1d41d7bf5cbbff655dd64377b07055c449a |
| SHA512 | e403348ee77bd3e7c45245dd5dae81c3ea130d5cf342f630982772ce5f75548b292013480e2831d68cf51349b64afde4589d4eec94b567d20f0a01e3b9549bdc |
memory/2412-10-0x0000000074D60000-0x000000007530B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-23 03:43
Reported
2024-05-23 03:45
Platform
win10v2004-20240426-en
Max time kernel
134s
Max time network
142s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisvc.exe" | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\DPI Service\dpisvc.exe | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Program Files (x86)\DPI Service\dpisvc.exe | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2012 wrote to memory of 1432 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2012 wrote to memory of 1432 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2012 wrote to memory of 1432 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2012 wrote to memory of 2628 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2012 wrote to memory of 2628 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2012 wrote to memory of 2628 | N/A | C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\699f37733b57e293985618ea991ce283_JaffaCakes118.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DPI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4006.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DPI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4046.tmp"
Network
| Country | Destination | Domain | Proto |
| CN | 82.156.51.150:54984 | tcp | |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 144.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| CN | 82.156.51.150:54984 | tcp | |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| US | 8.8.8.8:53 | 37.56.20.217.in-addr.arpa | udp |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp | |
| CN | 82.156.51.150:54984 | tcp |
Files
memory/2012-0-0x0000000074662000-0x0000000074663000-memory.dmp
memory/2012-1-0x0000000074660000-0x0000000074C11000-memory.dmp
memory/2012-2-0x0000000074660000-0x0000000074C11000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp4006.tmp
| MD5 | 76314906fb929452f73f2c3f2a184c4d |
| SHA1 | cad5fdd266d25897c48d45a35d7115c83362b06b |
| SHA256 | c8c485133541027ccb8abf707d6e79bae690b78d87d98e1285c3903f8acc3095 |
| SHA512 | 537ce2a5f382f7145a54ba9acc48c068d451a7b601cf1dbb8dc7ff94f760cd7ee0a101bcf52e7f37d1c2b9aebd328e52bc7556f652715392db7820ad072d7fcf |
C:\Users\Admin\AppData\Local\Temp\tmp4046.tmp
| MD5 | 0d6d94a917c4ce63da6bc50cbbe0dc5d |
| SHA1 | 599564f60649f3f4c14478e9cb184000d4280a61 |
| SHA256 | e82a4b8311319f1b68cb06ae5b670e97a11c467b1bdb0ebf130f523bf98ca522 |
| SHA512 | 23ac6a088e2a1df3d75d2aca17cdcc5a4147b966758e4acc4d904293f4693f362db637d8135edd670e158bec77e788e915f2a55042a2f1aec09a4679bc749412 |
memory/2012-10-0x0000000074660000-0x0000000074C11000-memory.dmp
memory/2012-11-0x0000000074660000-0x0000000074C11000-memory.dmp
memory/2012-12-0x0000000074662000-0x0000000074663000-memory.dmp
memory/2012-13-0x0000000074660000-0x0000000074C11000-memory.dmp
memory/2012-14-0x0000000074660000-0x0000000074C11000-memory.dmp