Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe
-
Size
812KB
-
MD5
73030e7dc8db294e9763bb3e3c33dd13
-
SHA1
15d03a0c208194bcd880c9a708381929b10a7cb3
-
SHA256
72b49528da64448a989732b8c39a8efa045a6d549b1d05a2887524f36a80170c
-
SHA512
9d3ca8dd8acac8489c94bee4e34c2aa217d1288a9d7d54982514f699e869e5b80c54976ec9370470992800e402a84babd9f6616f1d7b562af679ea445649b57a
-
SSDEEP
12288:ZXQKfNYn7ntgfKNjCmz0gYq888riG03MolRPxNhQT758acUKZWw3U0Q1FS6Z5PHB:lxCn7ttnJ5YQltjGafDZWw3N6ZlB/
Malware Config
Extracted
latentbot
fraieriimei2.zapto.org
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 explorer.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1712 set thread context of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 832 set thread context of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 2508 set thread context of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2788 set thread context of 2736 2788 explorer.exe 32 PID 2736 set thread context of 2712 2736 explorer.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeSecurityPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeSystemtimePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeBackupPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeRestorePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeShutdownPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeDebugPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeUndockPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeManageVolumePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeImpersonatePrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: 33 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: 34 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: 35 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2712 explorer.exe Token: SeSecurityPrivilege 2712 explorer.exe Token: SeTakeOwnershipPrivilege 2712 explorer.exe Token: SeLoadDriverPrivilege 2712 explorer.exe Token: SeSystemProfilePrivilege 2712 explorer.exe Token: SeSystemtimePrivilege 2712 explorer.exe Token: SeProfSingleProcessPrivilege 2712 explorer.exe Token: SeIncBasePriorityPrivilege 2712 explorer.exe Token: SeCreatePagefilePrivilege 2712 explorer.exe Token: SeBackupPrivilege 2712 explorer.exe Token: SeRestorePrivilege 2712 explorer.exe Token: SeShutdownPrivilege 2712 explorer.exe Token: SeDebugPrivilege 2712 explorer.exe Token: SeSystemEnvironmentPrivilege 2712 explorer.exe Token: SeChangeNotifyPrivilege 2712 explorer.exe Token: SeRemoteShutdownPrivilege 2712 explorer.exe Token: SeUndockPrivilege 2712 explorer.exe Token: SeManageVolumePrivilege 2712 explorer.exe Token: SeImpersonatePrivilege 2712 explorer.exe Token: SeCreateGlobalPrivilege 2712 explorer.exe Token: 33 2712 explorer.exe Token: 34 2712 explorer.exe Token: 35 2712 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 2788 explorer.exe 2736 explorer.exe 2712 explorer.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 1712 wrote to memory of 832 1712 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 29 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 832 wrote to memory of 2508 832 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2788 2508 73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2788 wrote to memory of 2736 2788 explorer.exe 32 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33 PID 2736 wrote to memory of 2712 2736 explorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73030e7dc8db294e9763bb3e3c33dd13_JaffaCakes118.exe"3⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
-
-