Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 01:38

General

  • Target

    d34057aa229cdea2ed624ffffaba443f_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    d34057aa229cdea2ed624ffffaba443f

  • SHA1

    864b7345d9932cbec3e9cff860d1d968fade8ab3

  • SHA256

    c05b20391b2a000fa21895dfd9308f599c2ba7e1341dcc689f3280a36b50f3d9

  • SHA512

    c139af2aa537b4839a5700c0aeaa8eed8953ec4e1605d5318c25c11bc256b4310b1a9ac4e1bb358fe69a8eb325994bcfb8007d944688a76fc4ff9fcc54d4cd3f

  • SSDEEP

    6144:WF0jTaOznFjm4YKdebVxBqGebpcu+kDfK11eHLVmCbjnF4F25qTG5fbJ:93RFfYqebVjqGQwkDSurZbjnF4F2im1

Malware Config

Extracted

Family

latentbot

C2

gniewkowiec0359.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d34057aa229cdea2ed624ffffaba443f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d34057aa229cdea2ed624ffffaba443f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Local\Temp\process32.exe
      C:\Users\Admin\AppData\Local\Temp\\process32.exe
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4456
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\process32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\process32.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\process32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\process32.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3672
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\C98U4SGMBN.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\C98U4SGMBN.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3224
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\C98U4SGMBN.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\C98U4SGMBN.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:428
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1232
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:964

Network

  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gniewkowiec0359.zapto.org
    process32.exe
    Remote address:
    8.8.8.8:53
    Request
    gniewkowiec0359.zapto.org
    IN A
    Response
    gniewkowiec0359.zapto.org
    IN A
    94.73.31.192
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gniewkowiec0359.zapto.org
    process32.exe
    Remote address:
    8.8.8.8:53
    Request
    gniewkowiec0359.zapto.org
    IN A
    Response
    gniewkowiec0359.zapto.org
    IN A
    94.73.31.192
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    gniewkowiec0359.zapto.org
    process32.exe
    Remote address:
    8.8.8.8:53
    Request
    gniewkowiec0359.zapto.org
    IN A
    Response
    gniewkowiec0359.zapto.org
    IN A
    94.73.31.192
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    208 B
    4
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    260 B
    5
  • 94.73.31.192:3594
    gniewkowiec0359.zapto.org
    process32.exe
    156 B
    3
  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    gniewkowiec0359.zapto.org
    dns
    process32.exe
    71 B
    87 B
    1
    1

    DNS Request

    gniewkowiec0359.zapto.org

    DNS Response

    94.73.31.192

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    gniewkowiec0359.zapto.org
    dns
    process32.exe
    71 B
    87 B
    1
    1

    DNS Request

    gniewkowiec0359.zapto.org

    DNS Response

    94.73.31.192

  • 8.8.8.8:53
    29.243.111.52.in-addr.arpa
    dns
    360 B
    5

    DNS Request

    29.243.111.52.in-addr.arpa

    DNS Request

    29.243.111.52.in-addr.arpa

    DNS Request

    29.243.111.52.in-addr.arpa

    DNS Request

    29.243.111.52.in-addr.arpa

    DNS Request

    29.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    222 B
    128 B
    3
    1

    DNS Request

    172.214.232.199.in-addr.arpa

    DNS Request

    172.214.232.199.in-addr.arpa

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    gniewkowiec0359.zapto.org
    dns
    process32.exe
    71 B
    87 B
    1
    1

    DNS Request

    gniewkowiec0359.zapto.org

    DNS Response

    94.73.31.192

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\process32.exe

    Filesize

    5KB

    MD5

    d2ed8fa3208e702b7d61728af768eed1

    SHA1

    54094aa272cb866a46c2ca5b56f4a094e0f48ffb

    SHA256

    9236208e312b2f47a0ef40e59fc0f364fc8e401717e1e46555c26bec8ab3de1f

    SHA512

    42442dc0b98f2abaea0c6516602d80df8a2a680278ecdc2b96fe5ce44685f7442347fd4ad13d9d99e0330cf0be7c0e9bbf22bd78c0173066221e430203c76313

  • memory/2828-22-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-1-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-2-0x0000000074600000-0x0000000074BB1000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-0-0x0000000074602000-0x0000000074603000-memory.dmp

    Filesize

    4KB

  • memory/4616-27-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-32-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-9-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-23-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-25-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-5-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-28-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-29-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-31-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-10-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-33-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-35-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-36-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-37-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-38-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-40-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/4616-41-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.