Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 01:13

General

  • Target

    827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe

  • Size

    852KB

  • MD5

    827897fc738bb1fe516cd74152f140bb

  • SHA1

    2573cabeb500a4e194381557b5327706fd92dd38

  • SHA256

    18909cd222e8155fb27a6b856901b2e10e0704ee59e8724424ac51b375eb8326

  • SHA512

    cce6c2437b15c7973fb927819d677b33bc5bb0715e1163ec5c86a6000f71f1fbe8387e9d18f0d000f2678dd7d6cc42c74f6c76b3382481269fb6222d331ce1d6

  • SSDEEP

    12288:9uEV3sUPJ0c00RDwme95mJyN2KYIosW0KaAPF9Fsv9uifapiPWQsSf7H4fiOXaUS:tjR83UrRLiC5aUrG

Malware Config

Extracted

Family

latentbot

C2

blackyshady.zapto.org

1blackyshady.zapto.org

2blackyshady.zapto.org

3blackyshady.zapto.org

4blackyshady.zapto.org

5blackyshady.zapto.org

6blackyshady.zapto.org

7blackyshady.zapto.org

8blackyshady.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Drops startup file 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:216
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3972
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:116
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Grand Theft Auto IV.bat""
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:5028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe

    Filesize

    852KB

    MD5

    827897fc738bb1fe516cd74152f140bb

    SHA1

    2573cabeb500a4e194381557b5327706fd92dd38

    SHA256

    18909cd222e8155fb27a6b856901b2e10e0704ee59e8724424ac51b375eb8326

    SHA512

    cce6c2437b15c7973fb927819d677b33bc5bb0715e1163ec5c86a6000f71f1fbe8387e9d18f0d000f2678dd7d6cc42c74f6c76b3382481269fb6222d331ce1d6

  • C:\Users\Admin\AppData\Roaming\Grand Theft Auto IV.bat

    Filesize

    218B

    MD5

    642db6bd8fcc59a15323342dd1989b6c

    SHA1

    fc6cafbee7f65c5ab1db009b6294651cf0e9580f

    SHA256

    54a870d394683824151806b528c9116e01864c4c74516b90a69eb61190d7c400

    SHA512

    96feb7a0dfbdf24daa6fea7879718547c1888ccfc4b40383150e9233134436fc59f7131639648cfbaae814a4e769385b7334a0aa23ef9e44a32871383805b68a

  • memory/2948-0-0x0000000074662000-0x0000000074663000-memory.dmp

    Filesize

    4KB

  • memory/2948-1-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/2948-2-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/2948-20-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/3452-3-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3452-5-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3452-21-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3452-22-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3452-24-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3452-25-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB