Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 00:35

General

  • Target

    fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    fdbaf1cf150f8ce9892cd77f8f57ee3a

  • SHA1

    30b9e7f9fd621887cc3c0d386e8f39e2d5c82229

  • SHA256

    2d68a08146c225053c8314282aca4053408e85ff77a9bbd302efe44f1db4739e

  • SHA512

    1c9b52214898992d138da884da8c360eb8a40aabb3fa8b9027bcc93686d4f1df2a77f00ecc75944eec063e896b65bc70d1e0c865c6a51e03f1894a4838a75caa

  • SSDEEP

    49152:qAoTSV3SSpwtb9rRbipPihj+dPGyFUJ8pg:qnu3nERmpPiF+9GyFUJ8K

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\Raga.exe
      "C:\Users\Admin\AppData\Local\Temp\Raga.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe":ZONE.identifier & exit
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:3940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe.log

    Filesize

    223B

    MD5

    1cc4c5b51e50ec74a6880b50ecbee28b

    SHA1

    1ba7bb0e86c3d23fb0dc8bf16798d37afb4c4aba

    SHA256

    0556734df26e82e363d47748a3ceedd5c23ea4b9ded6e68bd5c373c1c9f8777b

    SHA512

    5d5532602b381125b24a9bd78781ed722ce0c862214ef17e7d224d269e6e7045c919ab19896dd8d9ae8920726092efe0ffb776a77a9a9539c4a70188d5a4c706

  • C:\Users\Admin\AppData\Local\Temp\Raga.exe

    Filesize

    1.6MB

    MD5

    7028b8bcff9aa7fae47d5c29481d4eb9

    SHA1

    1c9deb7b3dcb44fec1f6be6dab46f158d7eb768e

    SHA256

    ed7fddc0861e1ba103554f9f8f65cc412ca4cb06d1ed371c9b380e6e8bc0f805

    SHA512

    4352e95ebed2f1617db5032a2ac35c06af1ee89cd22e9506e3d5f663a59efafa6462b0a1aed5fc2ac477666afa38bcf03462ff2b4033c3cc7e0a5641e2ddd91f

  • C:\Users\Admin\AppData\Local\Temp\evbB259.tmp

    Filesize

    1KB

    MD5

    152fd83c71248d63d3d291501ef59898

    SHA1

    a44017c0c31ec38ad1770a6540ca33e339de12ed

    SHA256

    61e38537744bbc4826d0cea5d922dd686fe78292444f096993de693195824434

    SHA512

    5f5be90c2f7bc2d02258c090b2f66b195f1dfc9fc58dfe4c5c8ed1a4394dee9086adbf97a4ae50b5058c5156c319799c2dd27745560e622e34d2074fe81d42a5

  • C:\Users\Admin\AppData\Local\Temp\fdbaf1cf150f8ce9892cd77f8f57ee3a_JaffaCakes118.exe

    Filesize

    2.3MB

    MD5

    fdbaf1cf150f8ce9892cd77f8f57ee3a

    SHA1

    30b9e7f9fd621887cc3c0d386e8f39e2d5c82229

    SHA256

    2d68a08146c225053c8314282aca4053408e85ff77a9bbd302efe44f1db4739e

    SHA512

    1c9b52214898992d138da884da8c360eb8a40aabb3fa8b9027bcc93686d4f1df2a77f00ecc75944eec063e896b65bc70d1e0c865c6a51e03f1894a4838a75caa

  • memory/1080-47-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-4-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-38-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-17-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-18-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-0-0x00000000750A2000-0x00000000750A3000-memory.dmp

    Filesize

    4KB

  • memory/1080-3-0x00000000750A2000-0x00000000750A3000-memory.dmp

    Filesize

    4KB

  • memory/1080-2-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/1080-1-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/3940-46-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/3940-48-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/3940-71-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/3940-67-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/3940-49-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-21-0x00000000750A2000-0x00000000750A3000-memory.dmp

    Filesize

    4KB

  • memory/4624-30-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-19-0x00000000779C2000-0x00000000779C3000-memory.dmp

    Filesize

    4KB

  • memory/4624-20-0x00000000779C3000-0x00000000779C4000-memory.dmp

    Filesize

    4KB

  • memory/4624-16-0x0000000000BD0000-0x0000000000F5A000-memory.dmp

    Filesize

    3.5MB

  • memory/4624-25-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/4624-34-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-65-0x0000000000BD0000-0x0000000000F5A000-memory.dmp

    Filesize

    3.5MB

  • memory/4624-66-0x00000000750A0000-0x0000000075651000-memory.dmp

    Filesize

    5.7MB

  • memory/4624-31-0x0000000006EC0000-0x0000000006F24000-memory.dmp

    Filesize

    400KB

  • memory/4624-33-0x0000000003C80000-0x0000000003C84000-memory.dmp

    Filesize

    16KB