Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe
-
Size
303KB
-
MD5
7246ec2be038522b09f6d16f81c85ee0
-
SHA1
aa103b718e330ff281ec022c0da95b757fcfcf6e
-
SHA256
951b43e630c972001fbfffffe720057b56d0e99a982568e390d177a9a4313a95
-
SHA512
20fb2007a659df6585e68c32aa7c83dcb7a6e792c9e5ed0a45af198be0e4fa39244637472bd844e1082a3563dbbe82d532ce3a89483736409c341262d02ef7ad
-
SSDEEP
6144:cdFNT/GHvnxFQLUGVzdJ1wNaHKuDQjgn:cdFGvxYUGxdJ1kOugn
Malware Config
Extracted
nanocore
1.2.2.0
lovemego.ddns.net:1606
194.68.59.80:1606
a1605a91-2084-4068-a947-dd39ee0e51fb
-
activate_away_mode
true
-
backup_connection_host
194.68.59.80
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-05-04T23:28:07.798272236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1606
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
a1605a91-2084-4068-a947-dd39ee0e51fb
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
lovemego.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svhost.exepid process 2648 svhost.exe -
Loads dropped DLL 1 IoCs
Processes:
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exepid process 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svhost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Service = "C:\\Program Files (x86)\\DDP Service\\ddpsv.exe" svhost.exe -
Processes:
svhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exedescription pid process target process PID 1712 set thread context of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
svhost.exedescription ioc process File created C:\Program Files (x86)\DDP Service\ddpsv.exe svhost.exe File opened for modification C:\Program Files (x86)\DDP Service\ddpsv.exe svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exesvhost.exepid process 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe 2648 svhost.exe 2648 svhost.exe 2648 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svhost.exepid process 2648 svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exesvhost.exedescription pid process Token: SeDebugPrivilege 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe Token: SeDebugPrivilege 2648 svhost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.execmd.exedescription pid process target process PID 1712 wrote to memory of 2984 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe cmd.exe PID 1712 wrote to memory of 2984 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe cmd.exe PID 1712 wrote to memory of 2984 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe cmd.exe PID 1712 wrote to memory of 2984 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe cmd.exe PID 2984 wrote to memory of 2568 2984 cmd.exe reg.exe PID 2984 wrote to memory of 2568 2984 cmd.exe reg.exe PID 2984 wrote to memory of 2568 2984 cmd.exe reg.exe PID 2984 wrote to memory of 2568 2984 cmd.exe reg.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe PID 1712 wrote to memory of 2648 1712 7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe svhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7246ec2be038522b09f6d16f81c85ee0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f3⤵PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD57246ec2be038522b09f6d16f81c85ee0
SHA1aa103b718e330ff281ec022c0da95b757fcfcf6e
SHA256951b43e630c972001fbfffffe720057b56d0e99a982568e390d177a9a4313a95
SHA51220fb2007a659df6585e68c32aa7c83dcb7a6e792c9e5ed0a45af198be0e4fa39244637472bd844e1082a3563dbbe82d532ce3a89483736409c341262d02ef7ad
-
Filesize
85KB
MD52e5f1cf69f92392f8829fc9c9263ae9b
SHA197b9ca766bbbdaa8c9ec960dc41b598f7fad82a5
SHA25651985a57e085d8b17042f0cdc1f905380b792854733eb3275fd8fce4e3bb886b
SHA512f7e096dd9d0fa3a3c04c01bf229c4b344798a4c8b7b848588c1d78cb9fadfa9b1d0fd53c1fe74d191d5561e9eb551a4a3fc918363f119ea60024dd3d67c83883