Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 15:48

General

  • Target

    ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ebaab581b2ee931e2c37f264f9540d41

  • SHA1

    51de89950ec1db8764c8f9d5fe7a3565036ccc59

  • SHA256

    e672d726f213a8cef50e54c695ec080202a1ce5d6242cb43f2cf1e8bcbd4c9bf

  • SHA512

    1eb0c1426f9eefb6837e5a6fdf77ae4f98e7fc383897ed8e25ddcced31c33f9b3e2314818bf060b9473c770e6b6f57f7fd52dedf94abf2e227f8a8b375ebcd88

  • SSDEEP

    24576:VmS5XmqepapmqRsyYtrWmQ3+7oUVj1Ku7WOU3L5fmaw:Vp+ymXsmGuqrQaw

Malware Config

Extracted

Family

latentbot

C2

yeniceriler.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Roaming\lsass.exe
      "C:\Users\Admin\AppData\Roaming\lsass.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\lsass.exe \"" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\lsass.exe \"" /f
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\run.bat

    Filesize

    143B

    MD5

    a8d91aa580142ee686b2d5f3eea594a2

    SHA1

    c8bb4a077c7658599c0a79e7bb6466e2d074d4e7

    SHA256

    710ab00e3089f3c3a2977bb678308a87d3bfe550efb19f9c542b0b71d4440ec7

    SHA512

    fab81eb4360d0280b4f4e31f348e566486f5c33900494ca6aaba15deb233e3d02efe1ce53e8ad0725bd75df99d089d6367c097728af1dd83cee54adc08054c1d

  • C:\Users\Admin\AppData\Roaming\ntldr.dll

    Filesize

    238KB

    MD5

    0b3dbeb484b811b80c7b2446ade2fe3d

    SHA1

    61aba38648814bd458a135bd8b6b71814f881086

    SHA256

    09c2ca21ad4584cf60b66c442dfda964240f90a691db485c6e37d3eed18b9bce

    SHA512

    75baee029aee1c563750d0d28df65986df9ad46dc04aa781aa23763bfefccc9787dcb45039961fb5d60f294fe14138ddeda6a6a5ef6a6580ce1ecd786f3fa2f4

  • \Users\Admin\AppData\Roaming\lsass.exe

    Filesize

    508KB

    MD5

    b1ee2759deb955663bf6b2a413396e10

    SHA1

    ee0ba67250a47a6fb0cf91b7b501446537fdd257

    SHA256

    f40329aff14a930da8f8cc2e31156dd5dc9c808e41489daeaa4b7c0397cb1373

    SHA512

    9083497d6496365c56f16b63f2e10ff37829eec4d284de5f7961fb058a41837b9675e60a3c945aaa33d08046e0e0837656c90d3f9996d87b0678568dbf967e6e

  • memory/2316-13-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2836-16-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/2836-26-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/2836-27-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB