Malware Analysis Report

2024-08-06 14:45

Sample ID 240625-1s85fayblp
Target 0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118
SHA256 b60944be145708e5fbe0bf5f038a6dda5bb8bb2ef535520744b89b8f2e82b07c
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b60944be145708e5fbe0bf5f038a6dda5bb8bb2ef535520744b89b8f2e82b07c

Threat Level: Known bad

The file 0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Checks whether UAC is enabled

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-25 21:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-25 21:55

Reported

2024-06-25 21:58

Platform

win7-20240611-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iuytgt = "C:\\Users\\Admin\\AppData\\Roaming\\49026461\\gakrk.pif C:\\Users\\Admin\\AppData\\Roaming\\49026461\\ACUEGV~1.NBW" C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Service = "C:\\Program Files (x86)\\DDP Service\\ddpsv.exe" C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1788 set thread context of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DDP Service\ddpsv.exe C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
File opened for modification C:\Program Files (x86)\DDP Service\ddpsv.exe C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 2384 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 1788 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
PID 2916 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1228 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1140 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1140 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1140 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe
PID 2916 wrote to memory of 1140 N/A C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe"

C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif

"C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif" acuegvfrj.nbw

C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp8823.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp8F55.tmp"

Network

Country Destination Domain Proto
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp
NL 45.137.22.142:9867 tcp

Files

\Users\Admin\AppData\Roaming\49026461\gakrk.pif

MD5 c01edc143bd4f18131950630185dbcea
SHA1 3b5814d8f173beb121e1b6fbcde9aaf4f7ca023f
SHA256 f26ee6a15f942b7dd034bd2d81ac8913a3c8e3f1639edc623adfa8be233b7bed
SHA512 352fa642cdba0ba50a6face538a4a8b64c3c011e7022c46c153d4aca5321616fa941ba42742ca245597fa571ca5218da2ad6209458d72780b320b4b8b0b60c55

C:\Users\Admin\AppData\Roaming\49026461\nnovphwdnx.cpl

MD5 37c50f0cfcb6fdfb7c2987ac18c16be3
SHA1 36790425c0344aff8beb7bc20ac739b3f04ff0d7
SHA256 58c2c4705dd077a3ab098d3648b3f75d24f210e3c1cd51281be1bfbf918b11a9
SHA512 d4f69f40325a3456d2f6a87dcfac4eeb1e0193a935518b3fadea97de871063c18a6bb09d099b72c05efd938227e0150ea2282e395b5711a48f05dd8a49095aef

C:\Users\Admin\AppData\Roaming\49026461\jinoow.cbr

MD5 176d166789c309f60e5fdec94933dbbb
SHA1 bacf8dc697113d24c69f5c41a1cadebe9812d13c
SHA256 bee0a50ab19bfdfb7dfbbe882277ed89d1b0f8d15eed22401ce4f09984c38dd0
SHA512 ad0b91dcef0a0675e5fcff78dbec61e5429f8997ef290d2baf9cd810be038ecfcb826960ffb310b74944e9095bfff209b5000291642413c55b1ff766af7be16e

\Users\Admin\AppData\Local\Temp\RegSvcs.exe

MD5 0e06054beb13192588e745ee63a84173
SHA1 30b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256 c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512 251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

memory/2916-184-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2916-182-0x00000000003C0000-0x0000000000A86000-memory.dmp

memory/2916-187-0x00000000003C0000-0x0000000000A86000-memory.dmp

memory/2916-185-0x00000000003C0000-0x0000000000A86000-memory.dmp

memory/2916-190-0x00000000003C0000-0x00000000003F8000-memory.dmp

memory/2916-188-0x00000000003C0000-0x0000000000A86000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp8823.tmp

MD5 95aceabc58acad5d73372b0966ee1b35
SHA1 2293b7ad4793cf574b1a5220e85f329b5601040a
SHA256 8d9642e1c3cd1e0b5d1763de2fb5e605ba593e5a918b93eec15acbc5dcc48fd4
SHA512 00760dfc9d8caf357f0cee5336e5448a4cca18e32cc63e1a69c16e34fe00ea29acd5b2cf278e86c6f9c3e66a1b176d27ed927361848212e6bf1fade7d3d06e74

C:\Users\Admin\AppData\Local\Temp\tmp8F55.tmp

MD5 93d357e6194c8eb8d0616a9f592cc4bf
SHA1 5cc3a3d95d82cb88f65cb6dc6c188595fa272808
SHA256 a18de0ef2102d2546c7afd07ad1d7a071a0e59aff0868cf3937a145f24feb713
SHA512 4df079387f6a76e0deb96ab4c11f6cffa62a8b42dc4970e885dab10351fade2d9e933663c141b76409657f85f1bf9dbb533d92dce52dc62598aafc4793743f7f

memory/2916-198-0x0000000000E00000-0x0000000000E0A000-memory.dmp

memory/2916-199-0x0000000001030000-0x000000000104E000-memory.dmp

memory/2916-200-0x00000000025F0000-0x00000000025FA000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-25 21:55

Reported

2024-06-25 21:58

Platform

win10v2004-20240226-en

Max time kernel

137s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0fac3790b807090b1a3e15d09591ff9e_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8

C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif

"C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif" acuegvfrj.nbw

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 37.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 8.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Roaming\49026461\gakrk.pif

MD5 c01edc143bd4f18131950630185dbcea
SHA1 3b5814d8f173beb121e1b6fbcde9aaf4f7ca023f
SHA256 f26ee6a15f942b7dd034bd2d81ac8913a3c8e3f1639edc623adfa8be233b7bed
SHA512 352fa642cdba0ba50a6face538a4a8b64c3c011e7022c46c153d4aca5321616fa941ba42742ca245597fa571ca5218da2ad6209458d72780b320b4b8b0b60c55