Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
e5702432eadc1638116a7f7cd43d1700
-
SHA1
32251993f2017072da41bb948ba5ce94d9c17835
-
SHA256
7ff819071c0cd76bbb2dfe40bcf1ad52b0028a2bc48d486a2c646b76527f6f22
-
SHA512
882a9eaaa704ff8e5bfd37dd34d409204bed1d555bdaebfd372f2be5d959ad0dcca017e80d02fd8e47436a4b93fc645f084fc0a59384f83cd42c5994b81cd902
-
SSDEEP
12288:JHjBJ99Y9Bs/zZIl5eYM4LvxdYz/PznEKqKoe:p1eiZS5ev4bxdo3znEKqKoe
Malware Config
Extracted
nanocore
1.2.2.0
213.183.40.60:1604
lambogini199.ddns.net:1604
13a4b19d-e995-40ab-ba06-c85c22f98055
-
activate_away_mode
true
-
backup_connection_host
lambogini199.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-01-10T20:45:10.900850236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
grace
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
13a4b19d-e995-40ab-ba06-c85c22f98055
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
213.183.40.60
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3684 svhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DNS Monitor = "C:\\Program Files (x86)\\DNS Monitor\\dnsmon.exe" svhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4424 set thread context of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DNS Monitor\dnsmon.exe svhost.exe File opened for modification C:\Program Files (x86)\DNS Monitor\dnsmon.exe svhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4732 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 3684 svhost.exe 3684 svhost.exe 3684 svhost.exe 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3684 svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe Token: SeDebugPrivilege 3684 svhost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2392 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 86 PID 4424 wrote to memory of 2392 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 86 PID 4424 wrote to memory of 2392 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 86 PID 2392 wrote to memory of 2160 2392 cmd.exe 88 PID 2392 wrote to memory of 2160 2392 cmd.exe 88 PID 2392 wrote to memory of 2160 2392 cmd.exe 88 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 3684 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 89 PID 4424 wrote to memory of 4460 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 90 PID 4424 wrote to memory of 4460 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 90 PID 4424 wrote to memory of 4460 4424 e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe 90 PID 4460 wrote to memory of 4732 4460 cmd.exe 92 PID 4460 wrote to memory of 4732 4460 cmd.exe 92 PID 4460 wrote to memory of 4732 4460 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5702432eadc1638116a7f7cd43d1700_JaffaCakes118.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4732
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD584c42d0f2c1ae761bef884638bc1eacd
SHA14353881e7f4e9c7610f4e0489183b55bb58bb574
SHA256331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3
SHA51243c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87
-
Filesize
1.5MB
MD5e5702432eadc1638116a7f7cd43d1700
SHA132251993f2017072da41bb948ba5ce94d9c17835
SHA2567ff819071c0cd76bbb2dfe40bcf1ad52b0028a2bc48d486a2c646b76527f6f22
SHA512882a9eaaa704ff8e5bfd37dd34d409204bed1d555bdaebfd372f2be5d959ad0dcca017e80d02fd8e47436a4b93fc645f084fc0a59384f83cd42c5994b81cd902
-
Filesize
201B
MD59d9b7b166f447b4f638f68f01373b335
SHA1a112a069f5f149d325a2e4dbf38f0e89db8247d8
SHA2567ccae4d2b1dabe635738495e89df4787e113dd99227360b4b10f57b068b6f42d
SHA5127267fd2257607c9133220c46aeb7c2b7ecfbd8b3bc5b599c2ec085e2e887447062a9a8184087254574bda448e118a92d09f7259518a51a3f039e8ea775864a48