Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
ed92ca0dc781fcdcc8813d388f88edcd
-
SHA1
95ab1962176590c1adb96a99efba73daf8898844
-
SHA256
fbe8d9d84fa140c7e9e9f04330342bc3c636d3f3a3c7d6bc1364e8b89198d2db
-
SHA512
864dd4c58b9e6b78ef648e2ccb54d1c7e06ebb3c3cd2c8f784d6cb3ba43fb1e06c1d1de030c466e506c1abb2bc65929bf29eb3067c55f33a2de56f3ac8479a18
-
SSDEEP
24576:XijhB3UGxxz1xtaA06oq1VqlrEWFtr1ju7VVBsAIuHfqGFcfNoI8eMEYppvtQd6c:4UGjpq6oqEb6BCuHfGfDNMjq0K
Malware Config
Extracted
latentbot
noiptest1905.zapto.org
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rundll.exe = "\"C:\\Users\\Admin\\AppData\\Local\\rundll.exe \"" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
standard.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation standard.exe -
Executes dropped EXE 2 IoCs
Processes:
standard.exerundll.exepid Process 2796 standard.exe 2152 rundll.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll.exepid Process 2152 rundll.exe 2152 rundll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exereg.exerundll.exeed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exestandard.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language standard.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exestandard.exerundll.exepid Process 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2796 standard.exe 2152 rundll.exe 2152 rundll.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
standard.exedescription pid Process Token: SeIncBasePriorityPrivilege 2796 standard.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll.exepid Process 2152 rundll.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exestandard.execmd.execmd.exedescription pid Process procid_target PID 2964 wrote to memory of 2796 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 82 PID 2964 wrote to memory of 2796 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 82 PID 2964 wrote to memory of 2796 2964 ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe 82 PID 2796 wrote to memory of 2344 2796 standard.exe 83 PID 2796 wrote to memory of 2344 2796 standard.exe 83 PID 2796 wrote to memory of 2344 2796 standard.exe 83 PID 2344 wrote to memory of 5076 2344 cmd.exe 85 PID 2344 wrote to memory of 5076 2344 cmd.exe 85 PID 2344 wrote to memory of 5076 2344 cmd.exe 85 PID 5076 wrote to memory of 2396 5076 cmd.exe 86 PID 5076 wrote to memory of 2396 5076 cmd.exe 86 PID 5076 wrote to memory of 2396 5076 cmd.exe 86 PID 2796 wrote to memory of 2152 2796 standard.exe 87 PID 2796 wrote to memory of 2152 2796 standard.exe 87 PID 2796 wrote to memory of 2152 2796 standard.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed92ca0dc781fcdcc8813d388f88edcd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\Microsoft\standard.exeC:\Users\Admin\AppData\Roaming\Microsoft\standard.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c syscheck.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V rundll.exe /D "\"C:\Users\Admin\AppData\Local\rundll.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V rundll.exe /D "\"C:\Users\Admin\AppData\Local\rundll.exe \"" /f5⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2396
-
-
-
-
C:\Users\Admin\AppData\Local\rundll.exe"C:\Users\Admin\AppData\Local\rundll.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD5d53c75977954601b591dba8be2f53cd1
SHA15073b31394b4bb63af3d7ec0985d3a66d209abbe
SHA256789c15d1350284cf0270658c414fa4ed204473644675cb13f9e3981d89724090
SHA512baa379fc240cc3e26155eaf71fa61fad78ba781f00615055e5227ccaf81bcde74723231d20b157ed2a78bf354b617da5d9d21a0badb11eb1bb3a87a86cf40ca9
-
Filesize
185KB
MD5c9c8e05aae60e89e9a46d606fca73341
SHA1aac659be91a7fe3cfb1c7c525f95987042697cce
SHA256c06ca0589f7ba5048a6f73b3f9c0279de3d8935ce7b9e416abb07612dbe4aada
SHA5123f4a7c2ed0abe8eb4635d3e4566bea16bd2d23ed16ba4f5e85d1afaa6523729a2a178559387a01fa1743b1bd0113933dcd41000a1293994b451252edb4c2e593
-
Filesize
402KB
MD53bcb5781f7563dee4346a4af5f8e6742
SHA173486ae550ba28970eaae921541f8081f082ca42
SHA256c56a77dcb580958ff7e6cfdfc155ffa0f6e289ba4fcba4968bdfed0f71a7ba91
SHA5122f8c41a3dd8c73f23fbb11ecab91de4ff834c218ef0ee4fd5501400892f8c171f3e35cfd78523b5a3a5bc691b66cc7d44bc5a9311287f030b704d449c516c758
-
Filesize
1.2MB
MD5bf57ce4e8e9abf193ac08c79b20d0737
SHA1089cee1c22d2ffaff24e1fe846bba5cfd2e6361d
SHA256bd204587bea4eea0fa3c6fedfb1b4cc5045a0807f6283b759058078292345f94
SHA5127ea3a7e4919adf84ffb52df594bf4cefa1fb09b10aaad241c3eff06ce2cca2588d473be23b51c0b4d0d4fcd5349cefd9e54c3449ebd199304f18ae9c33381b84