Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
ebaab581b2ee931e2c37f264f9540d41
-
SHA1
51de89950ec1db8764c8f9d5fe7a3565036ccc59
-
SHA256
e672d726f213a8cef50e54c695ec080202a1ce5d6242cb43f2cf1e8bcbd4c9bf
-
SHA512
1eb0c1426f9eefb6837e5a6fdf77ae4f98e7fc383897ed8e25ddcced31c33f9b3e2314818bf060b9473c770e6b6f57f7fd52dedf94abf2e227f8a8b375ebcd88
-
SSDEEP
24576:VmS5XmqepapmqRsyYtrWmQ3+7oUVj1Ku7WOU3L5fmaw:Vp+ymXsmGuqrQaw
Malware Config
Extracted
latentbot
yeniceriler.zapto.org
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exelsass.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 1 IoCs
Processes:
lsass.exepid Process 4464 lsass.exe -
Loads dropped DLL 2 IoCs
Processes:
lsass.exepid Process 4464 lsass.exe 4464 lsass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exelsass.execmd.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exelsass.exepid Process 3268 ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe 3268 ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe 4464 lsass.exe 4464 lsass.exe 4464 lsass.exe 4464 lsass.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
lsass.exepid Process 4464 lsass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exelsass.execmd.execmd.exedescription pid Process procid_target PID 3268 wrote to memory of 4464 3268 ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe 84 PID 3268 wrote to memory of 4464 3268 ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe 84 PID 3268 wrote to memory of 4464 3268 ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe 84 PID 4464 wrote to memory of 4964 4464 lsass.exe 85 PID 4464 wrote to memory of 4964 4464 lsass.exe 85 PID 4464 wrote to memory of 4964 4464 lsass.exe 85 PID 4964 wrote to memory of 3096 4964 cmd.exe 87 PID 4964 wrote to memory of 3096 4964 cmd.exe 87 PID 4964 wrote to memory of 3096 4964 cmd.exe 87 PID 3096 wrote to memory of 3976 3096 cmd.exe 88 PID 3096 wrote to memory of 3976 3096 cmd.exe 88 PID 3096 wrote to memory of 3976 3096 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebaab581b2ee931e2c37f264f9540d41_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\lsass.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V lsass /D "\"C:\Users\Admin\AppData\Roaming\lsass.exe \"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3976
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5a8d91aa580142ee686b2d5f3eea594a2
SHA1c8bb4a077c7658599c0a79e7bb6466e2d074d4e7
SHA256710ab00e3089f3c3a2977bb678308a87d3bfe550efb19f9c542b0b71d4440ec7
SHA512fab81eb4360d0280b4f4e31f348e566486f5c33900494ca6aaba15deb233e3d02efe1ce53e8ad0725bd75df99d089d6367c097728af1dd83cee54adc08054c1d
-
Filesize
508KB
MD5b1ee2759deb955663bf6b2a413396e10
SHA1ee0ba67250a47a6fb0cf91b7b501446537fdd257
SHA256f40329aff14a930da8f8cc2e31156dd5dc9c808e41489daeaa4b7c0397cb1373
SHA5129083497d6496365c56f16b63f2e10ff37829eec4d284de5f7961fb058a41837b9675e60a3c945aaa33d08046e0e0837656c90d3f9996d87b0678568dbf967e6e
-
Filesize
238KB
MD50b3dbeb484b811b80c7b2446ade2fe3d
SHA161aba38648814bd458a135bd8b6b71814f881086
SHA25609c2ca21ad4584cf60b66c442dfda964240f90a691db485c6e37d3eed18b9bce
SHA51275baee029aee1c563750d0d28df65986df9ad46dc04aa781aa23763bfefccc9787dcb45039961fb5d60f294fe14138ddeda6a6a5ef6a6580ce1ecd786f3fa2f4