Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe
-
Size
732KB
-
MD5
f65bce220a65369379b4cca2ce085581
-
SHA1
116d50a56a3d2ec07b3c742f10e41cb2152850d0
-
SHA256
b14e0ad4aed51e262fd9f3e3f2216e34570022b5dda68e25ca649431d7b09906
-
SHA512
3467b288be9a949b5111a37befa49302e8e445ae97913c859851446ef9124cdc152f3d7f600a220935784b1b75ec75510371cb751c65a6ed45bf26ff8b6900f9
-
SSDEEP
12288:9lIBMFAuXEA2VpG778J/9WWbS3ykiIAYPVhcxK:6MFAqL2VpIU/9WWbUJAYPVhcxK
Malware Config
Extracted
latentbot
asdqweqwdasdas.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\UseNetSpread.exe = "C:\\Users\\Admin\\AppData\\Roaming\\UseNetSpread.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Reader\\Adobe Updater Reader.exe:*:Enabled:Windows Messanger" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
Processes:
Adobe Updater Reader.exeAdobe Updater Reader.exeAdobe Updater Reader.exepid Process 2160 Adobe Updater Reader.exe 1900 Adobe Updater Reader.exe 3152 Adobe Updater Reader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Updater = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe Reader\\Adobe Updater Reader.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Adobe Updater Reader.exedescription pid Process procid_target PID 2160 set thread context of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 set thread context of 3152 2160 Adobe Updater Reader.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exereg.execmd.execmd.execmd.execmd.exereg.exereg.execmd.exeAdobe Updater Reader.exeAdobe Updater Reader.exeAdobe Updater Reader.exereg.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Updater Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Updater Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Updater Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid Process 3400 reg.exe 1960 reg.exe 1736 reg.exe 2128 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
Adobe Updater Reader.exeAdobe Updater Reader.exedescription pid Process Token: 1 1900 Adobe Updater Reader.exe Token: SeCreateTokenPrivilege 1900 Adobe Updater Reader.exe Token: SeAssignPrimaryTokenPrivilege 1900 Adobe Updater Reader.exe Token: SeLockMemoryPrivilege 1900 Adobe Updater Reader.exe Token: SeIncreaseQuotaPrivilege 1900 Adobe Updater Reader.exe Token: SeMachineAccountPrivilege 1900 Adobe Updater Reader.exe Token: SeTcbPrivilege 1900 Adobe Updater Reader.exe Token: SeSecurityPrivilege 1900 Adobe Updater Reader.exe Token: SeTakeOwnershipPrivilege 1900 Adobe Updater Reader.exe Token: SeLoadDriverPrivilege 1900 Adobe Updater Reader.exe Token: SeSystemProfilePrivilege 1900 Adobe Updater Reader.exe Token: SeSystemtimePrivilege 1900 Adobe Updater Reader.exe Token: SeProfSingleProcessPrivilege 1900 Adobe Updater Reader.exe Token: SeIncBasePriorityPrivilege 1900 Adobe Updater Reader.exe Token: SeCreatePagefilePrivilege 1900 Adobe Updater Reader.exe Token: SeCreatePermanentPrivilege 1900 Adobe Updater Reader.exe Token: SeBackupPrivilege 1900 Adobe Updater Reader.exe Token: SeRestorePrivilege 1900 Adobe Updater Reader.exe Token: SeShutdownPrivilege 1900 Adobe Updater Reader.exe Token: SeDebugPrivilege 1900 Adobe Updater Reader.exe Token: SeAuditPrivilege 1900 Adobe Updater Reader.exe Token: SeSystemEnvironmentPrivilege 1900 Adobe Updater Reader.exe Token: SeChangeNotifyPrivilege 1900 Adobe Updater Reader.exe Token: SeRemoteShutdownPrivilege 1900 Adobe Updater Reader.exe Token: SeUndockPrivilege 1900 Adobe Updater Reader.exe Token: SeSyncAgentPrivilege 1900 Adobe Updater Reader.exe Token: SeEnableDelegationPrivilege 1900 Adobe Updater Reader.exe Token: SeManageVolumePrivilege 1900 Adobe Updater Reader.exe Token: SeImpersonatePrivilege 1900 Adobe Updater Reader.exe Token: SeCreateGlobalPrivilege 1900 Adobe Updater Reader.exe Token: 31 1900 Adobe Updater Reader.exe Token: 32 1900 Adobe Updater Reader.exe Token: 33 1900 Adobe Updater Reader.exe Token: 34 1900 Adobe Updater Reader.exe Token: 35 1900 Adobe Updater Reader.exe Token: SeDebugPrivilege 3152 Adobe Updater Reader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
f65bce220a65369379b4cca2ce085581_JaffaCakes118.exeAdobe Updater Reader.exeAdobe Updater Reader.exeAdobe Updater Reader.exepid Process 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 2160 Adobe Updater Reader.exe 1900 Adobe Updater Reader.exe 1900 Adobe Updater Reader.exe 3152 Adobe Updater Reader.exe 1900 Adobe Updater Reader.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
f65bce220a65369379b4cca2ce085581_JaffaCakes118.execmd.exeAdobe Updater Reader.exeAdobe Updater Reader.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 3844 wrote to memory of 2984 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 82 PID 3844 wrote to memory of 2984 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 82 PID 3844 wrote to memory of 2984 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 82 PID 2984 wrote to memory of 1500 2984 cmd.exe 85 PID 2984 wrote to memory of 1500 2984 cmd.exe 85 PID 2984 wrote to memory of 1500 2984 cmd.exe 85 PID 3844 wrote to memory of 2160 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 86 PID 3844 wrote to memory of 2160 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 86 PID 3844 wrote to memory of 2160 3844 f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe 86 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 2160 wrote to memory of 1900 2160 Adobe Updater Reader.exe 87 PID 1900 wrote to memory of 3260 1900 Adobe Updater Reader.exe 88 PID 1900 wrote to memory of 3260 1900 Adobe Updater Reader.exe 88 PID 1900 wrote to memory of 3260 1900 Adobe Updater Reader.exe 88 PID 1900 wrote to memory of 4004 1900 Adobe Updater Reader.exe 89 PID 1900 wrote to memory of 4004 1900 Adobe Updater Reader.exe 89 PID 1900 wrote to memory of 4004 1900 Adobe Updater Reader.exe 89 PID 1900 wrote to memory of 4984 1900 Adobe Updater Reader.exe 90 PID 1900 wrote to memory of 4984 1900 Adobe Updater Reader.exe 90 PID 1900 wrote to memory of 4984 1900 Adobe Updater Reader.exe 90 PID 1900 wrote to memory of 3548 1900 Adobe Updater Reader.exe 92 PID 1900 wrote to memory of 3548 1900 Adobe Updater Reader.exe 92 PID 1900 wrote to memory of 3548 1900 Adobe Updater Reader.exe 92 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 2160 wrote to memory of 3152 2160 Adobe Updater Reader.exe 91 PID 4004 wrote to memory of 1960 4004 cmd.exe 97 PID 4004 wrote to memory of 1960 4004 cmd.exe 97 PID 4004 wrote to memory of 1960 4004 cmd.exe 97 PID 3260 wrote to memory of 3400 3260 cmd.exe 98 PID 3260 wrote to memory of 3400 3260 cmd.exe 98 PID 3260 wrote to memory of 3400 3260 cmd.exe 98 PID 3548 wrote to memory of 1736 3548 cmd.exe 99 PID 3548 wrote to memory of 1736 3548 cmd.exe 99 PID 3548 wrote to memory of 1736 3548 cmd.exe 99 PID 4984 wrote to memory of 2128 4984 cmd.exe 100 PID 4984 wrote to memory of 2128 4984 cmd.exe 100 PID 4984 wrote to memory of 2128 4984 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f65bce220a65369379b4cca2ce085581_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sBQuA.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Adobe Updater" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\UseNetSpread.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\UseNetSpread.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\UseNetSpread.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\UseNetSpread.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1736
-
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Updater Reader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5977bc61751f2ca8ed16df2d37298f9d1
SHA1637e17a297213cdc535e5a7cc3b4ca7c3d0380c0
SHA2566891dfb21658d11c835a68f000670b97cb98bdd401fccaddf2ae1f88cc13a399
SHA5129f79f1802c55b065edd35d682d1c0aa82dd389aa01f1f439efdc39d3aeb6bb27e5aa7b08589e683cad0b9525bb708f72a297d32601f2a15d385078a0a829e2a9
-
Filesize
732KB
MD5f65bce220a65369379b4cca2ce085581
SHA1116d50a56a3d2ec07b3c742f10e41cb2152850d0
SHA256b14e0ad4aed51e262fd9f3e3f2216e34570022b5dda68e25ca649431d7b09906
SHA5123467b288be9a949b5111a37befa49302e8e445ae97913c859851446ef9124cdc152f3d7f600a220935784b1b75ec75510371cb751c65a6ed45bf26ff8b6900f9