Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 22:58
Behavioral task
behavioral1
Sample
4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
Resource
win7-20240704-en
8 signatures
150 seconds
General
-
Target
4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
-
Size
78KB
-
MD5
4bc67e561cfc81a9c2ffdeb885559971
-
SHA1
809a8248ad1314984a40b96a9c1431154d1c8758
-
SHA256
21060eb4b32339fe0f47b7d02f72cbdecdfbc4bf38572a0b3d6ed927c9c0108a
-
SHA512
ef00a75f4c696c21dae930ef966670de448100f28b467372f4a63c4a9055f398e6495ab6727cda73caafe2314c78fafd5804a0427df8f137c78787f6bc42c459
-
SSDEEP
768:bMvmdWDVvSxCC2qNDofMfQ4Uvwqs7SqjnbcuyD7UbMvmd63:otVvjqNDofMfQ4UvwJ7Fjnouy8o1
Malware Config
Extracted
Family
latentbot
C2
atualizador.zapto.org
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0WinUpdater.lnk 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1928-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1928-16-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1928 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1928 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe 1928 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe 1928 4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bc67e561cfc81a9c2ffdeb885559971_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1928