Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe
-
Size
813KB
-
MD5
bf731bb4cf8fc8724c08864334e138a3
-
SHA1
2fd67abed797cbcb916125cb9d792f82cbad1d34
-
SHA256
5dc147d924897e4952e97d7724a9d401c1036bd37f6e6045e8251ff675599beb
-
SHA512
0a3ecd7f719f1b0b6097b686c73a5ae45ee5a7c874fcbfd89bb2e4d833ffd488738bf8704af580835ae228dc97b80f0a225c6b69d16e7d290ea198785d45c563
-
SSDEEP
12288:IlsKXp4DADHq8v/t43wJHFDhmS/ymmHcSrU0Qn7bcR0GYeATgUhVnRIF:41XptDHLuw1Nb/p93Rn3cR89MUhxRI
Malware Config
Extracted
latentbot
terranostra.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe:*:Enabled:udsc" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 4508 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tsunlim = "c:\\windows\\tsunlim.exe" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Modifies WinLogon 2 TTPs 6 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\EnableConcurrentSessions = "1" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\breakts = "0" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process File created C:\Windows\SysWOW64\dllcache\termsrv.dll bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\breakts = "0" bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.execmd.exedescription ioc Process File created \??\c:\windows\tsunlim.exe bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe File opened for modification \??\c:\windows\tsunlim.exe bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe File created C:\WINDOWS\ServicePackFiles\i386\termsrv.dll bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe File created \??\c:\windows\ipconfig.txt cmd.exe File created \??\c:\windows\ig.fgggf bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exenet1.exenet.exebf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.execmd.exenet.exenet.exenet1.execmd.exenet1.execmd.execmd.execmd.exenet1.exenetsh.exeipconfig.exenet.execmd.exenet.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 1336 ipconfig.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exenet.exenet.execmd.execmd.exenet.execmd.execmd.execmd.exenet.exenet.exedescription pid Process procid_target PID 4764 wrote to memory of 2320 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 2320 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 2320 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 84 PID 4764 wrote to memory of 32 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 85 PID 4764 wrote to memory of 32 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 85 PID 4764 wrote to memory of 32 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 85 PID 4764 wrote to memory of 2968 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 86 PID 4764 wrote to memory of 2968 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 86 PID 4764 wrote to memory of 2968 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 86 PID 4764 wrote to memory of 4712 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 87 PID 4764 wrote to memory of 4712 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 87 PID 4764 wrote to memory of 4712 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 87 PID 4764 wrote to memory of 2796 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 89 PID 4764 wrote to memory of 2796 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 89 PID 4764 wrote to memory of 2796 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 89 PID 4764 wrote to memory of 1728 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 91 PID 4764 wrote to memory of 1728 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 91 PID 4764 wrote to memory of 1728 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 91 PID 4764 wrote to memory of 3248 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 92 PID 4764 wrote to memory of 3248 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 92 PID 4764 wrote to memory of 3248 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 92 PID 4764 wrote to memory of 4780 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 93 PID 4764 wrote to memory of 4780 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 93 PID 4764 wrote to memory of 4780 4764 bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe 93 PID 2968 wrote to memory of 4340 2968 net.exe 100 PID 2968 wrote to memory of 4340 2968 net.exe 100 PID 2968 wrote to memory of 4340 2968 net.exe 100 PID 4712 wrote to memory of 4932 4712 net.exe 102 PID 4712 wrote to memory of 4932 4712 net.exe 102 PID 4712 wrote to memory of 4932 4712 net.exe 102 PID 3248 wrote to memory of 4508 3248 cmd.exe 101 PID 3248 wrote to memory of 4508 3248 cmd.exe 101 PID 3248 wrote to memory of 4508 3248 cmd.exe 101 PID 32 wrote to memory of 2964 32 cmd.exe 103 PID 32 wrote to memory of 2964 32 cmd.exe 103 PID 32 wrote to memory of 2964 32 cmd.exe 103 PID 2964 wrote to memory of 4216 2964 net.exe 104 PID 2964 wrote to memory of 4216 2964 net.exe 104 PID 2964 wrote to memory of 4216 2964 net.exe 104 PID 4780 wrote to memory of 1336 4780 cmd.exe 105 PID 4780 wrote to memory of 1336 4780 cmd.exe 105 PID 4780 wrote to memory of 1336 4780 cmd.exe 105 PID 1728 wrote to memory of 3048 1728 cmd.exe 106 PID 1728 wrote to memory of 3048 1728 cmd.exe 106 PID 1728 wrote to memory of 3048 1728 cmd.exe 106 PID 2796 wrote to memory of 4928 2796 cmd.exe 107 PID 2796 wrote to memory of 4928 2796 cmd.exe 107 PID 2796 wrote to memory of 4928 2796 cmd.exe 107 PID 3048 wrote to memory of 5004 3048 net.exe 108 PID 3048 wrote to memory of 5004 3048 net.exe 108 PID 3048 wrote to memory of 5004 3048 net.exe 108 PID 4928 wrote to memory of 2016 4928 net.exe 109 PID 4928 wrote to memory of 2016 4928 net.exe 109 PID 4928 wrote to memory of 2016 4928 net.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf731bb4cf8fc8724c08864334e138a3_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Hide Artifacts: Hidden Users
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\cmd.execmd /c del /q c:\windows\system32\dllcache\terms*.*2⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\cmd.execmd /c net user breakts hacker /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\net.exenet user breakts hacker /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user breakts hacker /add4⤵
- System Location Discovery: System Language Discovery
PID:4216
-
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administradores breakts /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administradores breakts /add3⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
-
C:\Windows\SysWOW64\net.exenet group "Domain Admins" BreakTS /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "Domain Admins" BreakTS /add3⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode disable2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /all > c:\windows\ipconfig.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1336
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023B
MD58f2df37eb28423b9c1d615346191c18d
SHA1f033102978c4dea08895d6450667d1cc17a75385
SHA2563dd1b699ca3366316f0e690617387d9f97dad88ac24c2dd5b3c034be52548ef5
SHA5125fbf30383199e952023a4371e8d52cdd5ba0c2e198e05f77f21ea4fcab8d0050d323f246f75f29c070544b9c642ed8d586383d368acdc0f0c2de067aa5ca585c