Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 03:10 UTC

General

  • Target

    d77fbdbf0671f94e5ad52d776d1d00d9_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    d77fbdbf0671f94e5ad52d776d1d00d9

  • SHA1

    6df71401e8af9364f791cda5f59e47e0f6c50eb2

  • SHA256

    adf1b43378fd895c6e6bd4e156e20e4b807e3c982a49ff752e4b08c09a60e8db

  • SHA512

    b25b557432be9664e0ceaa62756453c1e7596833cc822f073a5ca5af2e98259cd689095eaf08c53b25f1eaad7e95cfabc1a3535a627763031b722262a70e0227

  • SSDEEP

    24576:JAOcZypgWTwznE3xOx8EWc9MKxS95b6dunr+qpswD:jYEhOHWc9MKKJ6qrRps4

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

isaaconyejekwe.ddns.net:57356

185.19.85.170:57356

Mutex

7cb87162-489f-4296-9fd5-4773767fae1e

Attributes
  • activate_away_mode

    false

  • backup_connection_host

    185.19.85.170

  • backup_dns_server

  • buffer_size

    65538

  • build_time

    2020-06-16T18:23:50.920582536Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    false

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    57356

  • default_group

    JEKWU

  • enable_debug_mode

    true

  • gc_threshold

    1.0485772e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.0485772e+07

  • mutex

    7cb87162-489f-4296-9fd5-4773767fae1e

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    isaaconyejekwe.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    false

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8009

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d77fbdbf0671f94e5ad52d776d1d00d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d77fbdbf0671f94e5ad52d776d1d00d9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Roaming\37835067\kacgcghu.pif
      "C:\Users\Admin\AppData\Roaming\37835067\kacgcghu.pif" ltakoxpk.msc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /f /tn "ISS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC4A6.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2680
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /f /tn "ISS Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC591.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1424

Network

  • flag-us
    DNS
    isaaconyejekwe.ddns.net
    RegSvcs.exe
    Remote address:
    8.8.8.8:53
    Request
    isaaconyejekwe.ddns.net
    IN A
    Response
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 185.19.85.170:57356
    RegSvcs.exe
    152 B
    3
  • 8.8.8.8:53
    isaaconyejekwe.ddns.net
    dns
    RegSvcs.exe
    69 B
    129 B
    1
    1

    DNS Request

    isaaconyejekwe.ddns.net

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpC4A6.tmp

    Filesize

    1KB

    MD5

    95aceabc58acad5d73372b0966ee1b35

    SHA1

    2293b7ad4793cf574b1a5220e85f329b5601040a

    SHA256

    8d9642e1c3cd1e0b5d1763de2fb5e605ba593e5a918b93eec15acbc5dcc48fd4

    SHA512

    00760dfc9d8caf357f0cee5336e5448a4cca18e32cc63e1a69c16e34fe00ea29acd5b2cf278e86c6f9c3e66a1b176d27ed927361848212e6bf1fade7d3d06e74

  • C:\Users\Admin\AppData\Local\Temp\tmpC591.tmp

    Filesize

    1KB

    MD5

    3d1580c0395f6de62659467f5b7f1acf

    SHA1

    8e73a3885896cecca7ff799a272fc9ddfe06ea96

    SHA256

    6f40196c42a171f24a3e16edeca664cdc5a2f7c150d468255b0e14ab10a2b714

    SHA512

    7637c0d9b03227dffcb00a68d97ddce60bfc40ca0f8a7a4bbd700ea56be6d570908511dea5cab9f609a7da2e558e5298c482fd1e330af085f9c52867d5a847ea

  • C:\Users\Admin\AppData\Roaming\37835067\jrntgol.pdf

    Filesize

    471KB

    MD5

    db0ac5d457c297f00a170930625d6a53

    SHA1

    4d925521752fa5169124c17bd1f41dafa70759fc

    SHA256

    7d670f1d45bb12b2448c6f8a73bcdc133d88a469835f915043650db4ddb65a96

    SHA512

    24fc88925dc64ac54fbb1d1a6846a36b828dbdc8ebd744c548ff4daf4173aab03775b1ea06a58e1fabafb4732f8d0f7694c4aaa1ea2c7ce2e1be5a67f80c66c8

  • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • \Users\Admin\AppData\Roaming\37835067\kacgcghu.pif

    Filesize

    656KB

    MD5

    70126c034bfb34421cd4daf64b546f47

    SHA1

    dcf361386bcf09a36f30477af8571d13bfaff6ac

    SHA256

    7e1016fbcd8bbffab278b0ca2abe626dd6795f19828a9ee2f7eb1ca260eee622

    SHA512

    98e76076345a41e749da5aa2867995c68e78a53bd61730e9f2ae2d595f3e38eda40c4ddac78c769d442ef732c78691f429fcad1c2fc91924a999a90927c0ce86

  • memory/2776-70-0x00000000001D0000-0x0000000000917000-memory.dmp

    Filesize

    7.3MB

  • memory/2776-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2776-78-0x00000000001D0000-0x000000000020A000-memory.dmp

    Filesize

    232KB

  • memory/2776-76-0x00000000001D0000-0x0000000000917000-memory.dmp

    Filesize

    7.3MB

  • memory/2776-73-0x00000000001D0000-0x0000000000917000-memory.dmp

    Filesize

    7.3MB

  • memory/2776-75-0x00000000001D0000-0x0000000000917000-memory.dmp

    Filesize

    7.3MB

  • memory/2776-86-0x0000000001180000-0x000000000118A000-memory.dmp

    Filesize

    40KB

  • memory/2776-87-0x0000000001190000-0x000000000119C000-memory.dmp

    Filesize

    48KB

  • memory/2776-88-0x00000000011E0000-0x00000000011FE000-memory.dmp

    Filesize

    120KB

  • memory/2776-89-0x0000000002780000-0x000000000278A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.