Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe
-
Size
376KB
-
MD5
b3cfebdcb947eb0e4535ae55139ed7f7
-
SHA1
2a9dd3df89ee7fb877023a611471648bcf3c847b
-
SHA256
12a061b82ef5bc4becaee8f9069db0375fb461302107dd4d53dc85522df8c8e8
-
SHA512
a8fae75285688c25511daf21f12e623477de7ceec01969492c9d9a271611441c5498e82d72bb51a97d225748fe0c9e5fec6dc022ebfefdcfe33b2a5a5a4aca3d
-
SSDEEP
6144:Ri5VGE1WVdpej+0qqPnuVUMqmPsxYUeV01gBZzLhGbv2VTBP0wxEOS1:RqJQXwSyv6UuYYFVdXzEr23PPxEd
Malware Config
Extracted
nanocore
1.2.2.2
customcheats.ddns.net:9033
87faf343-d286-4cbf-ade2-da359eeccc75
-
activate_away_mode
false
-
backup_connection_host
customcheats.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2015-04-18T23:20:32.207091936Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9033
-
default_group
Team Speak 3
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
87faf343-d286-4cbf-ade2-da359eeccc75
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
customcheats.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exereg.exeb3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sys-win32 = "C:\\Users\\Admin\\Documents\\Jvtiucby.exe" b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sys-win32 = "C:\\Users\\Admin\\Documents\\Jvtiucby.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe -
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription pid process target process PID 380 set thread context of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1340 schtasks.exe 1524 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe Token: SeDebugPrivilege 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.execsc.execmd.exeb3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exedescription pid process target process PID 380 wrote to memory of 4936 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe csc.exe PID 380 wrote to memory of 4936 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe csc.exe PID 380 wrote to memory of 4936 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe csc.exe PID 4936 wrote to memory of 4296 4936 csc.exe cvtres.exe PID 4936 wrote to memory of 4296 4936 csc.exe cvtres.exe PID 4936 wrote to memory of 4296 4936 csc.exe cvtres.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 3236 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe PID 380 wrote to memory of 2140 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe cmd.exe PID 380 wrote to memory of 2140 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe cmd.exe PID 380 wrote to memory of 2140 380 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe cmd.exe PID 2140 wrote to memory of 532 2140 cmd.exe reg.exe PID 2140 wrote to memory of 532 2140 cmd.exe reg.exe PID 2140 wrote to memory of 532 2140 cmd.exe reg.exe PID 3236 wrote to memory of 1340 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe PID 3236 wrote to memory of 1340 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe PID 3236 wrote to memory of 1340 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe PID 3236 wrote to memory of 1524 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe PID 3236 wrote to memory of 1524 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe PID 3236 wrote to memory of 1524 3236 b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\saxynhyy.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9BF.tmp"3⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cfebdcb947eb0e4535ae55139ed7f7_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1102.tmp"3⤵
- Creates scheduled task(s)
PID:1340 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp122C.tmp"3⤵
- Creates scheduled task(s)
PID:1524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "sys-win32" /t REG_SZ /d "C:\Users\Admin\Documents\Jvtiucby.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "sys-win32" /t REG_SZ /d "C:\Users\Admin\Documents\Jvtiucby.exe3⤵
- Adds Run key to start application
PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES9C0.tmpFilesize
1KB
MD5e972dee36cb45b6d909b8b7f610b53f2
SHA106fb7f5bb454522688c0b03f4dc5c84a569b5b67
SHA25641f53976a7e671bc3a33b988d4818d91b70ba07aced4c76b5968a67e155a2557
SHA512013912317416439edd34b5991be772b6d256cfbe1cfdbb0df41019c50032ea824c43452599f0ced88254a51ada21e356aa096ff65a8557c80413503596dc9ab4
-
C:\Users\Admin\AppData\Local\Temp\saxynhyy.dllFilesize
336KB
MD5655794ea5757b5de139ec1e6b4a52ff8
SHA147522834b92686ce49eabc9d7f46bc7dd9017168
SHA25622782ac885f35cffdbee970b13848edc1ea6ba6c6fec5842e59f5f185d43fc90
SHA512090226e28565ad9164e6f9026e62f48bebbe486349d3247d3dd4e45dee175cc959b14be830cad3a11da8a22ff2f1dba8e2c19f538d1d117eda8719d2a75fe312
-
C:\Users\Admin\AppData\Local\Temp\tmp1102.tmpFilesize
1KB
MD542bc0023717e491e02198d0e8623120b
SHA1dccfa7ee27ec1bcbab72caf9797cdf8573044b5a
SHA256d5c63bc7fb2c21004ca5abcbfaf9082e5d03897835a0a8b4367f783d370d9b87
SHA512911fafa162da9b984d075817bb0e00be6369839a260851bcea16b6b615145390558c9635c2f38b64a9ac9503c59fd6beb7b12c35c578173381c2d75299568e7d
-
C:\Users\Admin\AppData\Local\Temp\tmp122C.tmpFilesize
1KB
MD50339b45ef206f4becc88be0d65e24b9e
SHA16503a1851f4ccd8c80a31f96bd7ae40d962c9fad
SHA2563d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83
SHA512c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC9BF.tmpFilesize
652B
MD51161ad963640292238f67a27844e4a7c
SHA170743adfacd3bb2cbf0f1f7df460dd4c785838bd
SHA256d536620bb4a130b27b8810cc631b5878ffec8b32029c5ab031d9acc1ec275578
SHA5126d2991758936f5075496a555663f57099ef8723ee360c7ff78dd9346a1b2975a117de3f16024a7b3c5ae966105d1b84a581b646f4e2a110440cf0b919750c493
-
\??\c:\Users\Admin\AppData\Local\Temp\saxynhyy.cmdlineFilesize
195B
MD55ba5431548d75afa20217cff80f6af7c
SHA122c571966e3b9046a989d2240af9024939489b5d
SHA256242a586b88404e8a3ba3d652f9943be34d5ba19324266cd5c2d311330f0cc4c8
SHA512a254dc152ff314150a28ec567e8c4b3fb2e2bbcb5cce53532556adc83c497acf4719d4065540e6140eebfbe83bc2855711cc847c172100e7b3aac3334d558ad6
-
\??\c:\Users\Admin\AppData\Local\Temp\tmp589.tmp.txtFilesize
161KB
MD56d6a9c939c4fbd3a0a5acf50fddd698a
SHA1f939adfd1bf55acaa78183ce6a1a564038c1bf18
SHA25643f3e409c96f4bc9da682ea2aad22d9b6620801be756bbca9c21461334e9f08b
SHA512a29879fa44e672243fc87f3c85c304a50e5b295279b93ea746db3be1212f621657d50ca4bbb1c648190ebc073d106fb63ec9ffc991073333d6d98a90533f66e7
-
memory/380-39-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/380-38-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/380-2-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/380-0-0x0000000074DE2000-0x0000000074DE3000-memory.dmpFilesize
4KB
-
memory/380-37-0x0000000074DE2000-0x0000000074DE3000-memory.dmpFilesize
4KB
-
memory/380-1-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/3236-24-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3236-29-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/3236-28-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/3236-23-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3236-25-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3236-40-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/4936-20-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB
-
memory/4936-13-0x0000000074DE0000-0x0000000075391000-memory.dmpFilesize
5.7MB