Analysis
-
max time kernel
147s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe
-
Size
896KB
-
MD5
f2c9685f78d6905e0c9644e8668e3664
-
SHA1
82c6b3dc28ba5c858b6caa3898094c5952540795
-
SHA256
6d6f9fa7620cf0056d02556ff97c31ce6e6915683c9f12177fc6b506a2dc19c9
-
SHA512
922107924eb0f84f9f07829bfe593e307fb71dc35265b2db25a75e6c7fc88c855e827c84ff20125e04c945c895d10733e6e657e5d60c49597fb1839546e2205e
-
SSDEEP
6144:9KZAoVdw7mzHD9ckgcJdAMBGW60H1obeF9tigMCt:9dw5HRckP0I7lVobAigN
Malware Config
Extracted
latentbot
bandidos373.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\ADTVB4LY33.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ADTVB4LY33.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\csc.exe:*:Enabled:Windows Messanger" reg.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACVPA-33X86-OB8PL-T8BWZ-TT2AE} f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACVPA-33X86-OB8PL-T8BWZ-TT2AE}\Pfad = "C:\\Users\\Admin\\AppData\\Roaming\\KqJuyYy.exe" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACVPA-33X86-OB8PL-T8BWZ-TT2AE}\IsInstalled = "1" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nYSZDQPfjm = "\"C:\\Users\\Admin\\AppData\\Roaming\\KEWTpM.exe\"" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\BZohRyCWyD = "\"C:\\Users\\Admin\\AppData\\Roaming\\KqJuyYy.exe\"" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/1472-3-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-13-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-17-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-12-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-8-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-5-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-24-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-26-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-28-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-29-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-30-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-32-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-37-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-40-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1472-42-0x0000000000400000-0x000000000045D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2952 reg.exe 2776 reg.exe 2688 reg.exe 2696 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1472 csc.exe Token: SeCreateTokenPrivilege 1472 csc.exe Token: SeAssignPrimaryTokenPrivilege 1472 csc.exe Token: SeLockMemoryPrivilege 1472 csc.exe Token: SeIncreaseQuotaPrivilege 1472 csc.exe Token: SeMachineAccountPrivilege 1472 csc.exe Token: SeTcbPrivilege 1472 csc.exe Token: SeSecurityPrivilege 1472 csc.exe Token: SeTakeOwnershipPrivilege 1472 csc.exe Token: SeLoadDriverPrivilege 1472 csc.exe Token: SeSystemProfilePrivilege 1472 csc.exe Token: SeSystemtimePrivilege 1472 csc.exe Token: SeProfSingleProcessPrivilege 1472 csc.exe Token: SeIncBasePriorityPrivilege 1472 csc.exe Token: SeCreatePagefilePrivilege 1472 csc.exe Token: SeCreatePermanentPrivilege 1472 csc.exe Token: SeBackupPrivilege 1472 csc.exe Token: SeRestorePrivilege 1472 csc.exe Token: SeShutdownPrivilege 1472 csc.exe Token: SeDebugPrivilege 1472 csc.exe Token: SeAuditPrivilege 1472 csc.exe Token: SeSystemEnvironmentPrivilege 1472 csc.exe Token: SeChangeNotifyPrivilege 1472 csc.exe Token: SeRemoteShutdownPrivilege 1472 csc.exe Token: SeUndockPrivilege 1472 csc.exe Token: SeSyncAgentPrivilege 1472 csc.exe Token: SeEnableDelegationPrivilege 1472 csc.exe Token: SeManageVolumePrivilege 1472 csc.exe Token: SeImpersonatePrivilege 1472 csc.exe Token: SeCreateGlobalPrivilege 1472 csc.exe Token: 31 1472 csc.exe Token: 32 1472 csc.exe Token: 33 1472 csc.exe Token: 34 1472 csc.exe Token: 35 1472 csc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1472 csc.exe 1472 csc.exe 1472 csc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 2220 wrote to memory of 1472 2220 f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe 30 PID 1472 wrote to memory of 2884 1472 csc.exe 31 PID 1472 wrote to memory of 2884 1472 csc.exe 31 PID 1472 wrote to memory of 2884 1472 csc.exe 31 PID 1472 wrote to memory of 2884 1472 csc.exe 31 PID 1472 wrote to memory of 2900 1472 csc.exe 32 PID 1472 wrote to memory of 2900 1472 csc.exe 32 PID 1472 wrote to memory of 2900 1472 csc.exe 32 PID 1472 wrote to memory of 2900 1472 csc.exe 32 PID 1472 wrote to memory of 2916 1472 csc.exe 34 PID 1472 wrote to memory of 2916 1472 csc.exe 34 PID 1472 wrote to memory of 2916 1472 csc.exe 34 PID 1472 wrote to memory of 2916 1472 csc.exe 34 PID 1472 wrote to memory of 2920 1472 csc.exe 35 PID 1472 wrote to memory of 2920 1472 csc.exe 35 PID 1472 wrote to memory of 2920 1472 csc.exe 35 PID 1472 wrote to memory of 2920 1472 csc.exe 35 PID 2884 wrote to memory of 2776 2884 cmd.exe 39 PID 2884 wrote to memory of 2776 2884 cmd.exe 39 PID 2884 wrote to memory of 2776 2884 cmd.exe 39 PID 2884 wrote to memory of 2776 2884 cmd.exe 39 PID 2916 wrote to memory of 2952 2916 cmd.exe 40 PID 2916 wrote to memory of 2952 2916 cmd.exe 40 PID 2916 wrote to memory of 2952 2916 cmd.exe 40 PID 2916 wrote to memory of 2952 2916 cmd.exe 40 PID 2920 wrote to memory of 2688 2920 cmd.exe 42 PID 2920 wrote to memory of 2688 2920 cmd.exe 42 PID 2920 wrote to memory of 2688 2920 cmd.exe 42 PID 2920 wrote to memory of 2688 2920 cmd.exe 42 PID 2900 wrote to memory of 2696 2900 cmd.exe 41 PID 2900 wrote to memory of 2696 2900 cmd.exe 41 PID 2900 wrote to memory of 2696 2900 cmd.exe 41 PID 2900 wrote to memory of 2696 2900 cmd.exe 41 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2c9685f78d6905e0c9644e8668e3664_JaffaCakes118.exe"1⤵
- UAC bypass
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Drivers directory
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\ADTVB4LY33.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ADTVB4LY33.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\ADTVB4LY33.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ADTVB4LY33.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6