Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 22:58
Behavioral task
behavioral1
Sample
4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
Resource
win7-20240704-en
8 signatures
150 seconds
General
-
Target
4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
-
Size
78KB
-
MD5
4bc67e561cfc81a9c2ffdeb885559971
-
SHA1
809a8248ad1314984a40b96a9c1431154d1c8758
-
SHA256
21060eb4b32339fe0f47b7d02f72cbdecdfbc4bf38572a0b3d6ed927c9c0108a
-
SHA512
ef00a75f4c696c21dae930ef966670de448100f28b467372f4a63c4a9055f398e6495ab6727cda73caafe2314c78fafd5804a0427df8f137c78787f6bc42c459
-
SSDEEP
768:bMvmdWDVvSxCC2qNDofMfQ4Uvwqs7SqjnbcuyD7UbMvmd63:otVvjqNDofMfQ4UvwJ7Fjnouy8o1
Malware Config
Extracted
Family
latentbot
C2
atualizador.zapto.org
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0WinUpdater.lnk 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1560-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1560-19-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1560 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1560 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe 1560 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe 1560 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe"1⤵
- Drops startup file
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1560