Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe
-
Size
290KB
-
MD5
788901d88a62786fe09465f48b87fdaf
-
SHA1
27b6926b2cc6012a6af85a03bc8ab1041d327f51
-
SHA256
4e054bef6499a2f80854bbbb4063c7d9eb5c139df5641a9ddc1d460c4a69f244
-
SHA512
e17dfcad3ee1f2df181d8dd63d4dd45c0405625c70d11247e0f493baf7d5cca7ec0754d94436d7b81c30507fdb1d0e0cbcaa4b2cf9de4ea211cee92783a6f7dd
-
SSDEEP
6144:ijbUCICA+OExgDQjQq2NlMWH3CGm9ptSjyjLlwqaKv6bc:ijwvCAUSnBTMyzm9ptpjh5ak
Malware Config
Extracted
latentbot
1easydung69.zapto.org
2easydung69.zapto.org
3easydung69.zapto.org
4easydung69.zapto.org
5easydung69.zapto.org
6easydung69.zapto.org
7easydung69.zapto.org
8easydung69.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\justin.exe = "C:\\Users\\Admin\\AppData\\Roaming\\justin.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\custom.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\custom.exe:*:Enabled:Windows Messanger" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 ÚÚìÝò.exe 2836 custom.exe -
Loads dropped DLL 3 IoCs
pid Process 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 2804 ÚÚìÝò.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Live = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ÚÚìÝò.exe" ÚÚìÝò.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2836 2804 ÚÚìÝò.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language custom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÚÚìÝò.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2684 reg.exe 1460 reg.exe 2080 reg.exe 2648 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2804 ÚÚìÝò.exe Token: 1 2836 custom.exe Token: SeCreateTokenPrivilege 2836 custom.exe Token: SeAssignPrimaryTokenPrivilege 2836 custom.exe Token: SeLockMemoryPrivilege 2836 custom.exe Token: SeIncreaseQuotaPrivilege 2836 custom.exe Token: SeMachineAccountPrivilege 2836 custom.exe Token: SeTcbPrivilege 2836 custom.exe Token: SeSecurityPrivilege 2836 custom.exe Token: SeTakeOwnershipPrivilege 2836 custom.exe Token: SeLoadDriverPrivilege 2836 custom.exe Token: SeSystemProfilePrivilege 2836 custom.exe Token: SeSystemtimePrivilege 2836 custom.exe Token: SeProfSingleProcessPrivilege 2836 custom.exe Token: SeIncBasePriorityPrivilege 2836 custom.exe Token: SeCreatePagefilePrivilege 2836 custom.exe Token: SeCreatePermanentPrivilege 2836 custom.exe Token: SeBackupPrivilege 2836 custom.exe Token: SeRestorePrivilege 2836 custom.exe Token: SeShutdownPrivilege 2836 custom.exe Token: SeDebugPrivilege 2836 custom.exe Token: SeAuditPrivilege 2836 custom.exe Token: SeSystemEnvironmentPrivilege 2836 custom.exe Token: SeChangeNotifyPrivilege 2836 custom.exe Token: SeRemoteShutdownPrivilege 2836 custom.exe Token: SeUndockPrivilege 2836 custom.exe Token: SeSyncAgentPrivilege 2836 custom.exe Token: SeEnableDelegationPrivilege 2836 custom.exe Token: SeManageVolumePrivilege 2836 custom.exe Token: SeImpersonatePrivilege 2836 custom.exe Token: SeCreateGlobalPrivilege 2836 custom.exe Token: 31 2836 custom.exe Token: 32 2836 custom.exe Token: 33 2836 custom.exe Token: 34 2836 custom.exe Token: 35 2836 custom.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2836 custom.exe 2836 custom.exe 2836 custom.exe 2836 custom.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2804 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2804 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2804 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2804 1712 788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2804 wrote to memory of 2836 2804 ÚÚìÝò.exe 30 PID 2836 wrote to memory of 2736 2836 custom.exe 31 PID 2836 wrote to memory of 2736 2836 custom.exe 31 PID 2836 wrote to memory of 2736 2836 custom.exe 31 PID 2836 wrote to memory of 2736 2836 custom.exe 31 PID 2836 wrote to memory of 2780 2836 custom.exe 32 PID 2836 wrote to memory of 2780 2836 custom.exe 32 PID 2836 wrote to memory of 2780 2836 custom.exe 32 PID 2836 wrote to memory of 2780 2836 custom.exe 32 PID 2836 wrote to memory of 2644 2836 custom.exe 34 PID 2836 wrote to memory of 2644 2836 custom.exe 34 PID 2836 wrote to memory of 2644 2836 custom.exe 34 PID 2836 wrote to memory of 2644 2836 custom.exe 34 PID 2836 wrote to memory of 2180 2836 custom.exe 36 PID 2836 wrote to memory of 2180 2836 custom.exe 36 PID 2836 wrote to memory of 2180 2836 custom.exe 36 PID 2836 wrote to memory of 2180 2836 custom.exe 36 PID 2736 wrote to memory of 2648 2736 cmd.exe 39 PID 2736 wrote to memory of 2648 2736 cmd.exe 39 PID 2736 wrote to memory of 2648 2736 cmd.exe 39 PID 2736 wrote to memory of 2648 2736 cmd.exe 39 PID 2780 wrote to memory of 2684 2780 cmd.exe 40 PID 2780 wrote to memory of 2684 2780 cmd.exe 40 PID 2780 wrote to memory of 2684 2780 cmd.exe 40 PID 2780 wrote to memory of 2684 2780 cmd.exe 40 PID 2644 wrote to memory of 1460 2644 cmd.exe 41 PID 2644 wrote to memory of 1460 2644 cmd.exe 41 PID 2644 wrote to memory of 1460 2644 cmd.exe 41 PID 2644 wrote to memory of 1460 2644 cmd.exe 41 PID 2180 wrote to memory of 2080 2180 cmd.exe 42 PID 2180 wrote to memory of 2080 2180 cmd.exe 42 PID 2180 wrote to memory of 2080 2180 cmd.exe 42 PID 2180 wrote to memory of 2080 2180 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\788901d88a62786fe09465f48b87fdaf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\ÚÚìÝò.exe"C:\Users\Admin\AppData\Local\Temp\ÚÚìÝò.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\custom.exeC:\Users\Admin\AppData\Local\Temp\custom.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\custom.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\custom.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\custom.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\custom.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\justin.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\justin.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\justin.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\justin.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2080
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
276KB
MD5adec8c52320c9c2c7cdf4649a6615fdd
SHA103514b8fbf7eb9f6afa7604b8d17cb6aa0eae3f1
SHA25669e8b3f250bc29e0cd8ab59404aeff7f78a7ff2e0fea69ed51f00b18dbfa6cc9
SHA51232c849614f4dd7f277c64cfc9caf6d8dc09e79aa62555d8f42c3ca4b9a938899865b1b192f03034c02c23e6433c41cf3e182b7fbaa0219d454ed57c580634201