Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
7e44702944cb2f8b43ce2b2d9fbcfa1a
-
SHA1
0008251c21af8160a07587c2bc777ee2d1b69349
-
SHA256
71745cf2ef502b43d51ad898f28e2d86de33ba43b85c72e7995610ad9f8a17eb
-
SHA512
dd35ac4334b0e22e3d7e78b2dec4dc36ee12e6699743d0b93c516f9bc8c4baa661c4401d72ae8d0bb9745c05103ea0532c5013ae4f376ec53fe69a5df122c495
-
SSDEEP
24576:4AHnh+eWsN3skA4RV1Hom2KXFmIa75HLAsJxkMlRGN4rVB9u0AoO5:/h+ZkldoPK1Xaz7vq4rVBi
Malware Config
Extracted
nanocore
1.2.2.0
41.231.120.137:4050
8962252f-b9b8-4055-af3a-9f194317caa0
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-03-13T15:07:48.849996136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4050
-
default_group
back
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
8962252f-b9b8-4055-af3a-9f194317caa0
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
41.231.120.137
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exedescription pid process target process PID 2124 set thread context of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegAsm.exepid process 1836 RegAsm.exe 1836 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 1836 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exepid process 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 1836 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exepid process 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exepid process 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exedescription pid process target process PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe PID 2124 wrote to memory of 1836 2124 7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7e44702944cb2f8b43ce2b2d9fbcfa1a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1836-2-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1836-6-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1836-4-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1836-8-0x0000000073FC2000-0x0000000073FC4000-memory.dmpFilesize
8KB
-
memory/1836-10-0x0000000073FC2000-0x0000000073FC4000-memory.dmpFilesize
8KB
-
memory/2124-1-0x00000000000B0000-0x00000000000B3000-memory.dmpFilesize
12KB