Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
-
Size
497KB
-
MD5
2a0d7246464998d8d73da8637fba0e68
-
SHA1
fb329ade3d5a934813682d7ddcb2a3b614fae0a2
-
SHA256
86a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702
-
SHA512
9da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677
-
SSDEEP
12288:b5+vRGbhLjSRAtdChCZ25fDa/tsTqRkmJN:b7hLuRAjCEAxDa/Oq6o
Malware Config
Extracted
latentbot
jurizaran0ff.zapto.org
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29BD9E8E-CDCF-45CC-8ED7-1CF2C1524802} userunit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29BD9E8E-CDCF-45CC-8ED7-1CF2C1524802}\StubPath = "C:\\Windows\\SysWOW64\\userunit.exe" userunit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\Control Panel\International\Geo\Nation 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2820 userunit.exe 5020 userunit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userunit = "C:\\Windows\\SysWOW64\\userunit.exe" userunit.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\userunit.exe 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\userunit.exe 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\userunit.exe userunit.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4428 set thread context of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 2820 set thread context of 5020 2820 userunit.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 2820 userunit.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 4428 wrote to memory of 964 4428 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 84 PID 964 wrote to memory of 2820 964 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 86 PID 964 wrote to memory of 2820 964 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 86 PID 964 wrote to memory of 2820 964 2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe 86 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87 PID 2820 wrote to memory of 5020 2820 userunit.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\userunit.exe"C:\Windows\System32\userunit.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\userunit.exe
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:5020
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD52a0d7246464998d8d73da8637fba0e68
SHA1fb329ade3d5a934813682d7ddcb2a3b614fae0a2
SHA25686a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702
SHA5129da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677