Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
-
Size
497KB
-
MD5
2a0d7246464998d8d73da8637fba0e68
-
SHA1
fb329ade3d5a934813682d7ddcb2a3b614fae0a2
-
SHA256
86a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702
-
SHA512
9da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677
-
SSDEEP
12288:b5+vRGbhLjSRAtdChCZ25fDa/tsTqRkmJN:b7hLuRAjCEAxDa/Oq6o
Malware Config
Extracted
latentbot
jurizaran0ff.zapto.org
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29BD9E8E-CDCF-45CC-8ED7-1CF2C1524802} userunit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29BD9E8E-CDCF-45CC-8ED7-1CF2C1524802}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\userunit.exe" userunit.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 userunit.exe 1352 userunit.exe -
Loads dropped DLL 2 IoCs
pid Process 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\userunit = "C:\\Users\\Admin\\AppData\\Local\\userunit.exe" userunit.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2192 set thread context of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2140 set thread context of 1352 2140 userunit.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 2140 userunit.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2620 2192 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 30 PID 2620 wrote to memory of 2140 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 31 PID 2620 wrote to memory of 2140 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 31 PID 2620 wrote to memory of 2140 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 31 PID 2620 wrote to memory of 2140 2620 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32 PID 2140 wrote to memory of 1352 2140 userunit.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\userunit.exe"C:\Users\Admin\AppData\Local\userunit.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\userunit.exe
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:1352
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD52a0d7246464998d8d73da8637fba0e68
SHA1fb329ade3d5a934813682d7ddcb2a3b614fae0a2
SHA25686a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702
SHA5129da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677