Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe
-
Size
569KB
-
MD5
ab0f429587409856cbf8b7eeda784818
-
SHA1
11361e5f830be948fe2f3115875baf8bd784009b
-
SHA256
9b916d451ce81a4fa56209262065797748bcbce9d8819288e46004c6d0f95c6b
-
SHA512
83ea74f260d64b143b44fbc067696aebe6e2cd670a4456b30b12282c0cb538428296fa53fd5ad37960d2edc146c95b4f383459f3ef666f4e672fd4dc243a801e
-
SSDEEP
12288:2NeZIXMuf2BBHkr4AgKB2E3/XjCPncDMQNvdL3XO2:68vLkrsE3/Xkc3vNnO
Malware Config
Extracted
nanocore
1.2.2.0
0.tcp.ngrok.io:15642
d61fa598-6d05-4c22-9eba-11b25460477f
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-05-15T14:08:35.896694436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
15642
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d61fa598-6d05-4c22-9eba-11b25460477f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
0.tcp.ngrok.io
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Service = "C:\\Program Files (x86)\\LAN Service\\lansv.exe" RegAsm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 36 0.tcp.ngrok.io 49 0.tcp.ngrok.io 51 0.tcp.ngrok.io 68 0.tcp.ngrok.io 76 0.tcp.ngrok.io 20 0.tcp.ngrok.io 47 0.tcp.ngrok.io 53 0.tcp.ngrok.io 60 0.tcp.ngrok.io 62 0.tcp.ngrok.io 34 0.tcp.ngrok.io 66 0.tcp.ngrok.io 70 0.tcp.ngrok.io 74 0.tcp.ngrok.io 42 0.tcp.ngrok.io 40 0.tcp.ngrok.io 64 0.tcp.ngrok.io 72 0.tcp.ngrok.io 38 0.tcp.ngrok.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LAN Service\lansv.exe RegAsm.exe File created C:\Program Files (x86)\LAN Service\lansv.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1460 RegAsm.exe 1460 RegAsm.exe 1460 RegAsm.exe 1460 RegAsm.exe 1460 RegAsm.exe 1460 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1460 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1460 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89 PID 3832 wrote to memory of 1460 3832 ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab0f429587409856cbf8b7eeda784818_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1460
-