Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2024, 12:44 UTC

General

  • Target

    d282825b8b00810fd3afa4798e314766_JaffaCakes118.exe

  • Size

    879KB

  • MD5

    d282825b8b00810fd3afa4798e314766

  • SHA1

    d8c174803c539d05a74b46a0da663735c12b1d06

  • SHA256

    b8a20c7281f3e0db60291a81218833c0626f1ebdb7c855d905c76116728d0122

  • SHA512

    1a7a17e019e369cefa9f6f6d13589065409b96550a23ef450520621d3138b18f869ae3f2aab8d1f8b5eccc2ee26b6e6ac599e3b9ca5ac06e0f1673db2952d14e

  • SSDEEP

    12288:uaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QM7urd7dkVgH4yGwS2+GN7DGOA:ZaHMv6Corjqny/QM7C2ylP+Y7DGN

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

178.172.236.15:1337

Mutex

174eea91-c6a6-480d-ba58-84ac033bdb25

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    178.172.236.15

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2016-01-27T11:19:35.243537036Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1337

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    174eea91-c6a6-480d-ba58-84ac033bdb25

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    178.172.236.15

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 3 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d282825b8b00810fd3afa4798e314766_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d282825b8b00810fd3afa4798e314766_JaffaCakes118.exe"
    1⤵
    • Subvert Trust Controls: Mark-of-the-Web Bypass
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\AppData\Roaming\system.exe
      C:\Users\Admin\AppData\Roaming\system.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /f /tn "PCI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpB565.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1696
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /f /tn "PCI Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpB5E3.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4892

Network

  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.125.209.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.125.209.23.in-addr.arpa
    IN PTR
    Response
    21.125.209.23.in-addr.arpa
    IN PTR
    a23-209-125-21deploystaticakamaitechnologiescom
  • flag-us
    DNS
    74.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    74.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    139.53.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    139.53.16.96.in-addr.arpa
    IN PTR
    Response
    139.53.16.96.in-addr.arpa
    IN PTR
    a96-16-53-139deploystaticakamaitechnologiescom
  • flag-us
    DNS
    10.125.209.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    10.125.209.23.in-addr.arpa
    IN PTR
    Response
    10.125.209.23.in-addr.arpa
    IN PTR
    a23-209-125-10deploystaticakamaitechnologiescom
  • flag-us
    DNS
    7.125.209.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    7.125.209.23.in-addr.arpa
    IN PTR
    Response
    7.125.209.23.in-addr.arpa
    IN PTR
    a23-209-125-7deploystaticakamaitechnologiescom
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 178.172.236.15:1337
    RegAsm.exe
    208 B
    4
  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    21.125.209.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    21.125.209.23.in-addr.arpa

  • 8.8.8.8:53
    74.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    74.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    28.118.140.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    28.118.140.52.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    139.53.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    139.53.16.96.in-addr.arpa

  • 8.8.8.8:53
    10.125.209.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    10.125.209.23.in-addr.arpa

  • 8.8.8.8:53
    7.125.209.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    7.125.209.23.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

  • 8.8.8.8:53

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autB1CB.tmp

    Filesize

    203KB

    MD5

    023b2cc81a56d12cd009cf877170e024

    SHA1

    a865ff4102b3e973d71b1deafb103f22b2b98bfc

    SHA256

    af9f0b6225ef28d7b5c4791c2a697bccb9b60cd827ce9779c1310cd66600324e

    SHA512

    58e359f7539668cc4d4df805c9163dfd1c3a2e22cadaa0c9c3de258d47eeb9a5433869de4f94ce6ac5173ea7567e8414912b048d6c8e621ad17c1a4cff041b15

  • C:\Users\Admin\AppData\Local\Temp\tmpB565.tmp

    Filesize

    1KB

    MD5

    c6f0625bf4c1cdfb699980c9243d3b22

    SHA1

    43de1fe580576935516327f17b5da0c656c72851

    SHA256

    8dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576

    SHA512

    9ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969

  • C:\Users\Admin\AppData\Local\Temp\tmpB5E3.tmp

    Filesize

    1KB

    MD5

    09063e7cc0d66a9aed53f2e2d2409103

    SHA1

    96f8fa15b5a3b2646f6691770a158c69ea7405a4

    SHA256

    369b159ef60c988373a3c85e0b10b5ff2178504465f11965ab0d66f14124f9a1

    SHA512

    c460a3cab70270c5cefe0464df6ddb9d50bb58ac9c49c7e62c9a55cc6bc30b6411cbc28ae418dd91b1ba1190f8394ccd937452ae70d7062740207d2ffc68e2ec

  • C:\Users\Admin\AppData\Roaming\system.exe

    Filesize

    879KB

    MD5

    d282825b8b00810fd3afa4798e314766

    SHA1

    d8c174803c539d05a74b46a0da663735c12b1d06

    SHA256

    b8a20c7281f3e0db60291a81218833c0626f1ebdb7c855d905c76116728d0122

    SHA512

    1a7a17e019e369cefa9f6f6d13589065409b96550a23ef450520621d3138b18f869ae3f2aab8d1f8b5eccc2ee26b6e6ac599e3b9ca5ac06e0f1673db2952d14e

  • memory/2316-21-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2316-26-0x00000000737E2000-0x00000000737E3000-memory.dmp

    Filesize

    4KB

  • memory/2316-27-0x00000000737E0000-0x0000000073D91000-memory.dmp

    Filesize

    5.7MB

  • memory/2316-28-0x00000000737E0000-0x0000000073D91000-memory.dmp

    Filesize

    5.7MB

  • memory/2316-36-0x00000000737E2000-0x00000000737E3000-memory.dmp

    Filesize

    4KB

  • memory/2316-37-0x00000000737E0000-0x0000000073D91000-memory.dmp

    Filesize

    5.7MB

  • memory/2316-38-0x00000000737E0000-0x0000000073D91000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.