Malware Analysis Report

2024-08-06 14:47

Sample ID 240616-wlbhdavdnp
Target b474720cf33c6f7b5b52309a5b093217_JaffaCakes118
SHA256 2328c5fb5d91fc3e957d9e5b9ba7c160afe4b3d6fadf184e426e98361c680426
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2328c5fb5d91fc3e957d9e5b9ba7c160afe4b3d6fadf184e426e98361c680426

Threat Level: Known bad

The file b474720cf33c6f7b5b52309a5b093217_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Nanocore family

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 18:00

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 18:00

Reported

2024-06-16 18:02

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2BA.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp471.tmp"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 142.250.186.42:443 chromewebstore.googleapis.com tcp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 42.186.250.142.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 203.197.17.2.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
N/A 127.0.0.1:122 tcp
N/A 127.0.0.1:122 tcp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 201.64.52.20.in-addr.arpa udp
N/A 127.0.0.1:122 tcp
N/A 127.0.0.1:122 tcp

Files

memory/4964-0-0x00000000750C2000-0x00000000750C3000-memory.dmp

memory/4964-1-0x00000000750C0000-0x0000000075671000-memory.dmp

memory/4964-2-0x00000000750C0000-0x0000000075671000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp2BA.tmp

MD5 25377a9aef8308a379eac2077315d49e
SHA1 0801d0772bcf0f615ff151a1b68fbfca616e141a
SHA256 ec46db9b6838b5f1a61ee7747be241ddd79730089ada6c16899636d2fa8789bb
SHA512 95ce8a9a3543f63b61636de54ff7651640d7079a9c6e3c5d9234d3e5f85fa8100c9268e21e51f7105dfa49a75deaf203f02322dcdc20a2468f0174b388e339ca

C:\Users\Admin\AppData\Local\Temp\tmp471.tmp

MD5 0339b45ef206f4becc88be0d65e24b9e
SHA1 6503a1851f4ccd8c80a31f96bd7ae40d962c9fad
SHA256 3d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83
SHA512 c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551

memory/4964-10-0x00000000750C0000-0x0000000075671000-memory.dmp

memory/4964-11-0x00000000750C2000-0x00000000750C3000-memory.dmp

memory/4964-12-0x00000000750C0000-0x0000000075671000-memory.dmp

memory/4964-13-0x00000000750C0000-0x0000000075671000-memory.dmp

memory/4964-14-0x00000000750C0000-0x0000000075671000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 18:00

Reported

2024-06-16 18:02

Platform

win7-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Service = "C:\\Program Files (x86)\\LAN Service\\lansv.exe" C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LAN Service\lansv.exe C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LAN Service\lansv.exe C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b474720cf33c6f7b5b52309a5b093217_JaffaCakes118.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1F72.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp200F.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
N/A 127.0.0.1:122 tcp
N/A 127.0.0.1:122 tcp
N/A 127.0.0.1:122 tcp
US 8.8.8.8:53 nucleardom.is-a-geek.com udp
US 8.8.4.4:53 nucleardom.is-a-geek.com udp

Files

memory/1596-0-0x0000000074871000-0x0000000074872000-memory.dmp

memory/1596-1-0x0000000074870000-0x0000000074E1B000-memory.dmp

memory/1596-2-0x0000000074870000-0x0000000074E1B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp1F72.tmp

MD5 25377a9aef8308a379eac2077315d49e
SHA1 0801d0772bcf0f615ff151a1b68fbfca616e141a
SHA256 ec46db9b6838b5f1a61ee7747be241ddd79730089ada6c16899636d2fa8789bb
SHA512 95ce8a9a3543f63b61636de54ff7651640d7079a9c6e3c5d9234d3e5f85fa8100c9268e21e51f7105dfa49a75deaf203f02322dcdc20a2468f0174b388e339ca

C:\Users\Admin\AppData\Local\Temp\tmp200F.tmp

MD5 6b30dba7972c92c9a1b881e88c108b15
SHA1 f76207985cc5a1f70edb2fb5bd45678f195a4564
SHA256 578f5b0ff051f02f8e0a67fc3424dad554fa9489875475ea624fbb63eabfcbf7
SHA512 e3dd368937f863cb07453de12173580fb63b8d3983db7119c24860f227c89ded76401c47607f5b1134d215d46fe2b40d4bc3d7299374f1e8abecdeaefc7b9099

memory/1596-10-0x0000000074870000-0x0000000074E1B000-memory.dmp