Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2024 21:12

General

  • Target

    7df47f4f8e7a1ea9520e4e2fd5350153_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    7df47f4f8e7a1ea9520e4e2fd5350153

  • SHA1

    f6fa5844752fff53d608afe0ef5f6c9d3d211dc5

  • SHA256

    26d55d977d85ccbd92ac9204083e039d69db38ac2d0440a7b2cb46f4d0376d3d

  • SHA512

    b1163c852e798bc6ab13cddf144cb30137656d63bea6552bb46e771604f0cdeccb2e55193eb205d8217f5b9f9499eac19daa68a918799661618525947ae40643

  • SSDEEP

    384:YWqNNA5RWT3qdy4TgGtpBiYrJy0bHPqPrqRd6BcHWCkW62qycuseXzVocCAW4W/K:YWqNuHggNybTU6aV6DeXxsY

Malware Config

Extracted

Family

latentbot

C2

crazyman131.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7df47f4f8e7a1ea9520e4e2fd5350153_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7df47f4f8e7a1ea9520e4e2fd5350153_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Roaming\app\winlogon.exe
      "C:\Users\Admin\AppData\Roaming\app\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\app\winlogon.exe

    Filesize

    28KB

    MD5

    7df47f4f8e7a1ea9520e4e2fd5350153

    SHA1

    f6fa5844752fff53d608afe0ef5f6c9d3d211dc5

    SHA256

    26d55d977d85ccbd92ac9204083e039d69db38ac2d0440a7b2cb46f4d0376d3d

    SHA512

    b1163c852e798bc6ab13cddf144cb30137656d63bea6552bb46e771604f0cdeccb2e55193eb205d8217f5b9f9499eac19daa68a918799661618525947ae40643

  • memory/2488-15-0x00007FF849A40000-0x00007FF84A501000-memory.dmp

    Filesize

    10.8MB

  • memory/2488-16-0x00007FF849A40000-0x00007FF84A501000-memory.dmp

    Filesize

    10.8MB

  • memory/2488-19-0x00007FF849A40000-0x00007FF84A501000-memory.dmp

    Filesize

    10.8MB

  • memory/2488-20-0x00007FF849A40000-0x00007FF84A501000-memory.dmp

    Filesize

    10.8MB

  • memory/4972-0-0x0000000000FC0000-0x0000000000FCE000-memory.dmp

    Filesize

    56KB

  • memory/4972-1-0x00007FF849A43000-0x00007FF849A45000-memory.dmp

    Filesize

    8KB