Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe
-
Size
536KB
-
MD5
fdaad4eb64eccc6953ff1ce550eae36f
-
SHA1
35992f8c51d54da131a04824faaac9c76e916943
-
SHA256
01ab9c62c600b245f23843974f3c51494e52dedc6147385e968dd9da85a8fee0
-
SHA512
2dd5d39c2b9fc0641df1b9dae1ac80f0429162b649f0661f9056f2a0c7a47b7c336f42ca56111a4165a0f5e1fc573bffb02a6160a380e4280052601fde907c6c
-
SSDEEP
12288:aox8a9XqSYVr9N4VGLLOwwfghkNANPuMVfJ3bfguQ:0s50M2OkWShBg
Malware Config
Extracted
nanocore
1.2.2.0
ghostcum.ddns.net:4040
5bbc7391-512a-4cae-9589-1734252a7b7d
-
activate_away_mode
true
-
backup_connection_host
ghostcum.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-07-02T10:14:45.673398236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4040
-
default_group
EUROS
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5bbc7391-512a-4cae-9589-1734252a7b7d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
ghostcum.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Manager = "C:\\Program Files (x86)\\DOS Manager\\dosmgr.exe" regasm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA regasm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1376 regasm.exe 1376 regasm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DOS Manager\dosmgr.exe regasm.exe File created C:\Program Files (x86)\DOS Manager\dosmgr.exe regasm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe 1376 regasm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 regasm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1376 2060 fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdaad4eb64eccc6953ff1ce550eae36f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1376
-