Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2024 01:57

General

  • Target

    c42ddbce16aea96c0bb88d9e87c980a2_JaffaCakes118.exe

  • Size

    620KB

  • MD5

    c42ddbce16aea96c0bb88d9e87c980a2

  • SHA1

    526145c89f037374a2bcc1cfd7c8c5432e325409

  • SHA256

    92e79e9d1b1706ac5e31616473a4ee97c23f9adc8e2e6b8a28698e1194277e59

  • SHA512

    24cc40fee52425430b98ccbf35fafe861c4547a84d5955229339fa17e856164b857f1095a8667739884020c4289cc7de3ef7cae7821055393ed3cdb97f7b2b4d

  • SSDEEP

    12288:b1+XIo9JSfYOgY8Kljo34ojth+qQ6lmQKFN65l1PaZr4a6M2yOK:gS8ONqh+qQ6lkN6r1yZr4NM2yt

Malware Config

Extracted

Family

latentbot

C2

dcomete70353.zapto.org

1dcomete70353.zapto.org

2dcomete70353.zapto.org

3dcomete70353.zapto.org

4dcomete70353.zapto.org

5dcomete70353.zapto.org

6dcomete70353.zapto.org

7dcomete70353.zapto.org

8dcomete70353.zapto.org

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c42ddbce16aea96c0bb88d9e87c980a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c42ddbce16aea96c0bb88d9e87c980a2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2576
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2172
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2804
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:836
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KSF20FP27A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KSF20FP27A.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KSF20FP27A.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KSF20FP27A.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1884
      • C:\Users\Admin\AppData\Local\Temp\System\mtvdemd.exe
        "C:\Users\Admin\AppData\Local\Temp\System\mtvdemd.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
        • C:\Users\Admin\AppData\Local\Temp\System\hpwebregUI.exe
          "C:\Users\Admin\AppData\Local\Temp\System\hpwebregUI.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

    Filesize

    84B

    MD5

    b6f45e8d01c84e5ae5ab366c3431dd1c

    SHA1

    88c6466a0209b97522143baf3660243bcce9c188

    SHA256

    50e5db6d78daba4f2aad5ceb1cd565f797d45789c5e7c84aa5ebabf251ec0dfb

    SHA512

    ff59740e75c1b748f62376de71ea1bdced08a260208b676726b70e09557bc857445af451795f5a5775ee4190cc3c1b6003ca72106a4fb8c0bdb1af141f078120

  • C:\Users\Admin\AppData\Local\Temp\System\mtvdemd.exe

    Filesize

    10KB

    MD5

    4060deb426df1b2cbece8fc3084ba768

    SHA1

    85a7c7e72bc1ee2d911e3a3e58c2150618e7ab14

    SHA256

    eff08d524f3a6f2722bbbf5f0d00d8a87f051ad9a3c2a059400a81c68ea4cc05

    SHA512

    64748645d1d6e130b47e2ca7d980292776a6f5b801ec7e422443e56613265b86a20d002dca2977264edcf24d70462b122a81c9158e4a680647cd8312e455b921

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

    Filesize

    620KB

    MD5

    c42ddbce16aea96c0bb88d9e87c980a2

    SHA1

    526145c89f037374a2bcc1cfd7c8c5432e325409

    SHA256

    92e79e9d1b1706ac5e31616473a4ee97c23f9adc8e2e6b8a28698e1194277e59

    SHA512

    24cc40fee52425430b98ccbf35fafe861c4547a84d5955229339fa17e856164b857f1095a8667739884020c4289cc7de3ef7cae7821055393ed3cdb97f7b2b4d

  • memory/1776-22-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1776-20-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1776-49-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1776-48-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/1776-24-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1776-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1776-28-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2672-2-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2672-0-0x0000000074B81000-0x0000000074B82000-memory.dmp

    Filesize

    4KB

  • memory/2672-11-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2672-1-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-13-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-47-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-14-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-12-0x0000000074B80000-0x000000007512B000-memory.dmp

    Filesize

    5.7MB