Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 22:49

General

  • Target

    2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe

  • Size

    497KB

  • MD5

    2a0d7246464998d8d73da8637fba0e68

  • SHA1

    fb329ade3d5a934813682d7ddcb2a3b614fae0a2

  • SHA256

    86a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702

  • SHA512

    9da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677

  • SSDEEP

    12288:b5+vRGbhLjSRAtdChCZ25fDa/tsTqRkmJN:b7hLuRAjCEAxDa/Oq6o

Malware Config

Extracted

Family

latentbot

C2

jurizaran0ff.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\2a0d7246464998d8d73da8637fba0e68_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\SysWOW64\userunit.exe
        "C:\Windows\System32\userunit.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\userunit.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          PID:5020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\userunit.exe

    Filesize

    497KB

    MD5

    2a0d7246464998d8d73da8637fba0e68

    SHA1

    fb329ade3d5a934813682d7ddcb2a3b614fae0a2

    SHA256

    86a316be1d4aeaa8af78b7d04c5c33a3d369061441261039132eed65d3e6d702

    SHA512

    9da4def17bbc0534d0eccbcbda3e57674c5be472b1ffcfc2057fc70fb919b0f64f3d4ac828782430b2833685c3801fc0c59ecf4d2bc040e832db5985ff657677

  • memory/964-26-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/964-40-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/964-29-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/964-28-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/964-27-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2820-57-0x0000000002140000-0x0000000002150000-memory.dmp

    Filesize

    64KB

  • memory/2820-51-0x0000000000630000-0x0000000000640000-memory.dmp

    Filesize

    64KB

  • memory/2820-44-0x00000000005C0000-0x00000000005D0000-memory.dmp

    Filesize

    64KB

  • memory/2820-50-0x0000000000620000-0x0000000000630000-memory.dmp

    Filesize

    64KB

  • memory/2820-45-0x00000000005D0000-0x00000000005E0000-memory.dmp

    Filesize

    64KB

  • memory/2820-65-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2820-66-0x00000000021D0000-0x00000000021E0000-memory.dmp

    Filesize

    64KB

  • memory/2820-62-0x0000000002190000-0x00000000021A0000-memory.dmp

    Filesize

    64KB

  • memory/2820-63-0x00000000021A0000-0x00000000021B0000-memory.dmp

    Filesize

    64KB

  • memory/2820-64-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/2820-61-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/2820-60-0x0000000002170000-0x0000000002180000-memory.dmp

    Filesize

    64KB

  • memory/2820-52-0x0000000000640000-0x0000000000650000-memory.dmp

    Filesize

    64KB

  • memory/2820-53-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/2820-54-0x0000000002110000-0x0000000002120000-memory.dmp

    Filesize

    64KB

  • memory/2820-55-0x0000000002120000-0x0000000002130000-memory.dmp

    Filesize

    64KB

  • memory/2820-59-0x0000000002160000-0x0000000002170000-memory.dmp

    Filesize

    64KB

  • memory/2820-58-0x0000000002150000-0x0000000002160000-memory.dmp

    Filesize

    64KB

  • memory/2820-56-0x0000000002130000-0x0000000002140000-memory.dmp

    Filesize

    64KB

  • memory/2820-43-0x00000000005A0000-0x00000000005B0000-memory.dmp

    Filesize

    64KB

  • memory/2820-46-0x00000000005E0000-0x00000000005F0000-memory.dmp

    Filesize

    64KB

  • memory/2820-47-0x00000000005F0000-0x0000000000600000-memory.dmp

    Filesize

    64KB

  • memory/2820-48-0x0000000000600000-0x0000000000610000-memory.dmp

    Filesize

    64KB

  • memory/2820-49-0x0000000000610000-0x0000000000620000-memory.dmp

    Filesize

    64KB

  • memory/4428-14-0x00000000029C0000-0x00000000029D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-12-0x00000000029A0000-0x00000000029B0000-memory.dmp

    Filesize

    64KB

  • memory/4428-1-0x00000000021A0000-0x00000000021B0000-memory.dmp

    Filesize

    64KB

  • memory/4428-0-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/4428-3-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-8-0x0000000002960000-0x0000000002970000-memory.dmp

    Filesize

    64KB

  • memory/4428-9-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/4428-7-0x0000000002950000-0x0000000002960000-memory.dmp

    Filesize

    64KB

  • memory/4428-6-0x0000000002940000-0x0000000002950000-memory.dmp

    Filesize

    64KB

  • memory/4428-5-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/4428-23-0x0000000002B70000-0x0000000002B80000-memory.dmp

    Filesize

    64KB

  • memory/4428-11-0x0000000002990000-0x00000000029A0000-memory.dmp

    Filesize

    64KB

  • memory/4428-2-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/4428-10-0x0000000002980000-0x0000000002990000-memory.dmp

    Filesize

    64KB

  • memory/4428-13-0x00000000029B0000-0x00000000029C0000-memory.dmp

    Filesize

    64KB

  • memory/4428-4-0x00000000021D0000-0x00000000021E0000-memory.dmp

    Filesize

    64KB

  • memory/4428-15-0x00000000029D0000-0x00000000029E0000-memory.dmp

    Filesize

    64KB

  • memory/4428-17-0x00000000029F0000-0x0000000002A00000-memory.dmp

    Filesize

    64KB

  • memory/4428-21-0x0000000002B50000-0x0000000002B60000-memory.dmp

    Filesize

    64KB

  • memory/4428-22-0x0000000002B60000-0x0000000002B70000-memory.dmp

    Filesize

    64KB

  • memory/4428-19-0x0000000002A10000-0x0000000002A20000-memory.dmp

    Filesize

    64KB

  • memory/4428-20-0x0000000002B40000-0x0000000002B50000-memory.dmp

    Filesize

    64KB

  • memory/4428-18-0x0000000002A00000-0x0000000002A10000-memory.dmp

    Filesize

    64KB

  • memory/4428-16-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB

  • memory/5020-72-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/5020-73-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/5020-74-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/5020-75-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB