Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
7feb921d455110673638dcd0d2a12139
-
SHA1
263f52ebf0d5cac5505ac4eb101ad85fd15f7ac2
-
SHA256
c81b8f4e3913f35f78702f1848b10dfbf81ce84c0e240f9af463b94fe2c2d2b2
-
SHA512
5762bec714b9ea155f99f1cbc340803143f683a97770af7ea0156512a22bd42f6c02ca06f609d9d9d086ef10eda87b7cb72a7abd8668af99c040e5911850a7fb
-
SSDEEP
24576:1u6Jx3O0c+JY5UZ+XC0kGso/WaulMBxMJwE9LgbezWY:XI0c++OCvkGsUWauObNY
Malware Config
Extracted
nanocore
1.2.2.0
queen101.ddns.net:4050
94724ccb-e307-4d91-9cde-954ab4b78baa
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-09-08T14:35:36.962164136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4050
-
default_group
yoo
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
94724ccb-e307-4d91-9cde-954ab4b78baa
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
queen101.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atl.url 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exedescription pid process target process PID 4464 set thread context of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exepid process 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 4012 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 4012 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exepid process 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exepid process 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
7feb921d455110673638dcd0d2a12139_JaffaCakes118.exedescription pid process target process PID 4464 wrote to memory of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe PID 4464 wrote to memory of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe PID 4464 wrote to memory of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe PID 4464 wrote to memory of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe PID 4464 wrote to memory of 4012 4464 7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7feb921d455110673638dcd0d2a12139_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4012-5-0x0000000000740000-0x0000000000778000-memory.dmpFilesize
224KB
-
memory/4012-10-0x0000000073582000-0x0000000073583000-memory.dmpFilesize
4KB
-
memory/4012-11-0x0000000073580000-0x0000000073B31000-memory.dmpFilesize
5.7MB
-
memory/4012-12-0x0000000073580000-0x0000000073B31000-memory.dmpFilesize
5.7MB
-
memory/4012-14-0x0000000073582000-0x0000000073583000-memory.dmpFilesize
4KB
-
memory/4012-15-0x0000000073580000-0x0000000073B31000-memory.dmpFilesize
5.7MB
-
memory/4464-3-0x0000000000BA0000-0x0000000000BD3000-memory.dmpFilesize
204KB
-
memory/4464-4-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB