Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 15:06

General

  • Target

    6be43b02cbcbbb43fe5760caf02aff32_JaffaCakes118.exe

  • Size

    828KB

  • MD5

    6be43b02cbcbbb43fe5760caf02aff32

  • SHA1

    43422e004f1093f03ffa6ee07261db8fdb536f6f

  • SHA256

    1c3fc888876735d180b715a1e588192336fbafa40a2267ac95e0b0cb7642d16f

  • SHA512

    146bea63727672f36421e0e86e122b8634a82fd57401f8aa285f508eb268b8e029fe6cfb094bf583df116f7cb0a557828fbce2cc8808838a6202cd8f18ac85db

  • SSDEEP

    24576:xKoOUyJVULhmqhj6Ev8XxAv6PWkxzKAQflD:xnOUyJV7qwEv8hE6O6WAI

Malware Config

Extracted

Family

latentbot

C2

shadowisawesome7.zapto.org

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6be43b02cbcbbb43fe5760caf02aff32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6be43b02cbcbbb43fe5760caf02aff32_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\winini.exe
      "C:\Users\Admin\AppData\Local\Temp\winini.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3700
      • C:\Users\Admin\AppData\Local\Temp\cvtres.exe
        C:\Users\Admin\AppData\Local\Temp\cvtres.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cvtres.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • C:\Users\Admin\AppData\Local\Temp\winini.exe

    Filesize

    552KB

    MD5

    0bc34c511e421965377ddf160b3e18d1

    SHA1

    6cf5d96032b9e763612b0870ad6eb8f303a94394

    SHA256

    f795fba64d78b38b749e53319d93ee2969e3e0b9f57d2024549f28d25c79bbc9

    SHA512

    24e287e385d5f045297cf5d7719f7bc55a37f1d088eb5331baa6d01d21d9d658c828cf621dedad2f4ac98f5e0bda620de9b1b90513244792a4edb6ed29a5e407

  • memory/1120-1-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/1120-2-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/1120-15-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/1120-0-0x0000000074CD2000-0x0000000074CD3000-memory.dmp

    Filesize

    4KB

  • memory/1388-33-0x0000000074C80000-0x0000000075288000-memory.dmp

    Filesize

    6.0MB

  • memory/1388-35-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-47-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-20-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-46-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-45-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-27-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-32-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-31-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-30-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-44-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-25-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-34-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-23-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-36-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-37-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-38-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-39-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-40-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-41-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-42-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1388-43-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/3700-16-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/3700-28-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/3700-29-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB

  • memory/3700-17-0x0000000074CD0000-0x0000000075281000-memory.dmp

    Filesize

    5.7MB