Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 10:41
Behavioral task
behavioral1
Sample
08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe
Resource
win7-20240611-en
7 signatures
150 seconds
General
-
Target
08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe
-
Size
658KB
-
MD5
08087d038d8ca3cb86880939d28e208a
-
SHA1
029ce32c2e15bb9fa0a3ecce5ee2b986bffb2ae0
-
SHA256
2fe3c81aef01566ad7dbab01b58837dc9fcd835247cb3d982d64caec61e026a2
-
SHA512
579bbe0285b8d6110dc4583f8fb7d8be9cc60ee67bb754e5284fde9315326aae8816194ffa179dc18dca316cd45bcb5cfd59fc484e8b15e99609062b51bebb0c
-
SSDEEP
12288:J9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKjE:vAQ6Zx9cxTmOrucTIEFSpOGGE
Malware Config
Extracted
Family
latentbot
C2
2345676543212345.zapto.org
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeSecurityPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeSystemtimePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeBackupPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeRestorePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeShutdownPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeDebugPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeUndockPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeManageVolumePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeImpersonatePrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: 33 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: 34 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe Token: 35 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08087d038d8ca3cb86880939d28e208a_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2968