Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 04:27

General

  • Target

    4031832fa9d533dfe61b5e00dbc383f7_JaffaCakes118.exe

  • Size

    43KB

  • MD5

    4031832fa9d533dfe61b5e00dbc383f7

  • SHA1

    b381840d18a2655f335001f6273ebd98d22b1af3

  • SHA256

    3a24e8cbb7e639aafe5f5753db4e9547ff4dd42b34d692fd4d498319c36c97ec

  • SHA512

    c571eb511c8951690ae309ac8c3c49eafcd7d1ee02a5249e3b34c5937bb1a1ffd7eeac56dae2230cd48d17255095cb82a13159efe151275109b6fb169df8a3a0

  • SSDEEP

    768:RBn4ol613kXyc3hpRgoGRit9BDBS2B1PgKP7i/hrOwpFeolk8y:RTXy0RgmE23P9PG/TpQoaF

Malware Config

Extracted

Family

latentbot

C2

superwaffles.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4031832fa9d533dfe61b5e00dbc383f7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4031832fa9d533dfe61b5e00dbc383f7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\lsass.exe
      "C:\Users\Admin\AppData\Local\Temp\lsass.exe"
      2⤵
      • Executes dropped EXE
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lsass.exe

    Filesize

    43KB

    MD5

    4031832fa9d533dfe61b5e00dbc383f7

    SHA1

    b381840d18a2655f335001f6273ebd98d22b1af3

    SHA256

    3a24e8cbb7e639aafe5f5753db4e9547ff4dd42b34d692fd4d498319c36c97ec

    SHA512

    c571eb511c8951690ae309ac8c3c49eafcd7d1ee02a5249e3b34c5937bb1a1ffd7eeac56dae2230cd48d17255095cb82a13159efe151275109b6fb169df8a3a0