Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe
-
Size
318KB
-
MD5
e75d27a4dec7334e548a776a58137877
-
SHA1
85e46d71cd015e4714459d2fe73f6c9a066199f5
-
SHA256
5e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
-
SHA512
28669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f
-
SSDEEP
6144:TKjZaimwIqlazWEIBk4ZAs3CaYo/TRg4w6kT1kYftg5d672:dZqIzW35RFn9g311kYfi6K
Malware Config
Extracted
latentbot
75as4d53a1sd.zapto.org
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation nvxdsinc.exe -
Deletes itself 1 IoCs
pid Process 696 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 696 explorer.exe 4264 nvxdsinc.exe 1788 nwtray.exe -
resource yara_rule behavioral2/memory/640-22-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-23-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-24-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-25-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-26-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-29-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-28-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/640-30-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 696 set thread context of 640 696 explorer.exe 98 PID 1788 set thread context of 4428 1788 nwtray.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 696 explorer.exe 696 explorer.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe 696 explorer.exe 696 explorer.exe 1788 nwtray.exe 1788 nwtray.exe 4264 nvxdsinc.exe 4264 nvxdsinc.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 4436 e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe Token: SeDebugPrivilege 696 explorer.exe Token: SeIncreaseQuotaPrivilege 640 AppLaunch.exe Token: SeSecurityPrivilege 640 AppLaunch.exe Token: SeTakeOwnershipPrivilege 640 AppLaunch.exe Token: SeLoadDriverPrivilege 640 AppLaunch.exe Token: SeSystemProfilePrivilege 640 AppLaunch.exe Token: SeSystemtimePrivilege 640 AppLaunch.exe Token: SeProfSingleProcessPrivilege 640 AppLaunch.exe Token: SeIncBasePriorityPrivilege 640 AppLaunch.exe Token: SeCreatePagefilePrivilege 640 AppLaunch.exe Token: SeBackupPrivilege 640 AppLaunch.exe Token: SeRestorePrivilege 640 AppLaunch.exe Token: SeShutdownPrivilege 640 AppLaunch.exe Token: SeDebugPrivilege 640 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 640 AppLaunch.exe Token: SeChangeNotifyPrivilege 640 AppLaunch.exe Token: SeRemoteShutdownPrivilege 640 AppLaunch.exe Token: SeUndockPrivilege 640 AppLaunch.exe Token: SeManageVolumePrivilege 640 AppLaunch.exe Token: SeImpersonatePrivilege 640 AppLaunch.exe Token: SeCreateGlobalPrivilege 640 AppLaunch.exe Token: 33 640 AppLaunch.exe Token: 34 640 AppLaunch.exe Token: 35 640 AppLaunch.exe Token: 36 640 AppLaunch.exe Token: SeDebugPrivilege 4264 nvxdsinc.exe Token: SeDebugPrivilege 1788 nwtray.exe Token: SeIncreaseQuotaPrivilege 4428 AppLaunch.exe Token: SeSecurityPrivilege 4428 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4428 AppLaunch.exe Token: SeLoadDriverPrivilege 4428 AppLaunch.exe Token: SeSystemProfilePrivilege 4428 AppLaunch.exe Token: SeSystemtimePrivilege 4428 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4428 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4428 AppLaunch.exe Token: SeCreatePagefilePrivilege 4428 AppLaunch.exe Token: SeBackupPrivilege 4428 AppLaunch.exe Token: SeRestorePrivilege 4428 AppLaunch.exe Token: SeShutdownPrivilege 4428 AppLaunch.exe Token: SeDebugPrivilege 4428 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4428 AppLaunch.exe Token: SeChangeNotifyPrivilege 4428 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4428 AppLaunch.exe Token: SeUndockPrivilege 4428 AppLaunch.exe Token: SeManageVolumePrivilege 4428 AppLaunch.exe Token: SeImpersonatePrivilege 4428 AppLaunch.exe Token: SeCreateGlobalPrivilege 4428 AppLaunch.exe Token: 33 4428 AppLaunch.exe Token: 34 4428 AppLaunch.exe Token: 35 4428 AppLaunch.exe Token: 36 4428 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 640 AppLaunch.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4436 wrote to memory of 696 4436 e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe 97 PID 4436 wrote to memory of 696 4436 e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe 97 PID 4436 wrote to memory of 696 4436 e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe 97 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 640 696 explorer.exe 98 PID 696 wrote to memory of 4264 696 explorer.exe 99 PID 696 wrote to memory of 4264 696 explorer.exe 99 PID 696 wrote to memory of 4264 696 explorer.exe 99 PID 4264 wrote to memory of 1788 4264 nvxdsinc.exe 101 PID 4264 wrote to memory of 1788 4264 nvxdsinc.exe 101 PID 4264 wrote to memory of 1788 4264 nvxdsinc.exe 101 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102 PID 1788 wrote to memory of 4428 1788 nwtray.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5916 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:81⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD50451492ae6a77572a8cb1ea3d2c3f31b
SHA102628d7a95f0dac3ca89a4c2b8af0519f9495c6f
SHA25617002ccc3bd7423ad1ee64917d130feb784343ea6c5e765ed6dbfca3abd7951f
SHA5120f92a59890dab0cc7e9d851b786115fad359cfd1de9621e8abc3830ebd1123d03d66daca9ab5fc7afe7e438a260126121b56eea497e8727054069502a667ea2d
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274
-
Filesize
318KB
MD5e75d27a4dec7334e548a776a58137877
SHA185e46d71cd015e4714459d2fe73f6c9a066199f5
SHA2565e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
SHA51228669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f