Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
08dad122feeb76cad7ffafcd9f81aee1
-
SHA1
df3f4229405825d486c6ab5afde6ebcb5ae8fd54
-
SHA256
5924f706585d42c20a5236404c6bf3b27e37184b5dc9870f5c6fb7b69ce54838
-
SHA512
c40fd8705845939c6d20aeb42a187f9f106a4f31a6a2b7946716d237d9df68787c365387fb6d7e049cc0dd578b59f698359f1742064e9ef1e9ba0146d75547d3
-
SSDEEP
24576:CupRi52nSVkBIEWYzIDM6z185HhTD9Ctpr0hNSNV09:C5VkB5oM7JBCtFY
Malware Config
Extracted
latentbot
hackerlamer.zapto.org
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3068 FileName.exe 2164 FileName.exe 296 FileName.exe 2752 FileName.exe -
Loads dropped DLL 5 IoCs
pid Process 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\FileName.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2208 set thread context of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 set thread context of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 3068 set thread context of 2164 3068 FileName.exe 37 PID 3068 set thread context of 296 3068 FileName.exe 38 PID 3068 set thread context of 2752 3068 FileName.exe 39 -
resource yara_rule behavioral1/memory/1312-670-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/956-671-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1312-681-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2164-1322-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/956-1499-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2164-1502-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/296-1506-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe Token: SeDebugPrivilege 296 FileName.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 656 DllHost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 1312 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 3068 FileName.exe 296 FileName.exe 2164 FileName.exe 656 DllHost.exe 656 DllHost.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1312 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 30 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 2208 wrote to memory of 956 2208 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 31 PID 956 wrote to memory of 884 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 33 PID 956 wrote to memory of 884 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 33 PID 956 wrote to memory of 884 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 33 PID 956 wrote to memory of 884 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 33 PID 884 wrote to memory of 2708 884 cmd.exe 35 PID 884 wrote to memory of 2708 884 cmd.exe 35 PID 884 wrote to memory of 2708 884 cmd.exe 35 PID 884 wrote to memory of 2708 884 cmd.exe 35 PID 956 wrote to memory of 3068 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 36 PID 956 wrote to memory of 3068 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 36 PID 956 wrote to memory of 3068 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 36 PID 956 wrote to memory of 3068 956 08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe 36 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 2164 3068 FileName.exe 37 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 296 3068 FileName.exe 38 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39 PID 3068 wrote to memory of 2752 3068 FileName.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08dad122feeb76cad7ffafcd9f81aee1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LYHHT.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:296
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5a7721cdbbbba65653ea208cb8193d12b
SHA1ddf61419fa642e1176c559790138e3a0ee898c65
SHA256d2336e875fe13cec23a748d16db82a25ba2dff3ec8f7477e84c4121f4d2a6847
SHA51212fbec3ddb7eb7da28a12889a32f4f2aeb20bab9564d876760f82f7615c017b592381ab6ba3d945ffdeba86a150f54ccbdfa961580b74fa6692fbcbb24b11bb6
-
Filesize
449KB
MD54bf6b33ec4e30bb63085fcb4d8b7c0eb
SHA178f20cee659432f1218290ff2fed3b53a2b4ad1d
SHA256d34fe2b88f3208d4160bc7576f29df889a2db9de3139cb0dccc172eae79a9345
SHA5121a7d75e5e15fc1ef704a184a1f66c56a870478ec278d45a8d11f8b039943d2a49cc4a26b394eb9313a8edaf80cec38db34b2de25537c34629ff090b187d48d1a
-
Filesize
1.1MB
MD555ec65134648bcab50b318062f154446
SHA19b91914ad49ec556ac2e4ba587e009e3410d172b
SHA256235bdc32def603e304757605aa34c43784a411103d69f518055a1f5ec784386a
SHA512964ff6e885a34ddc4e6517bf895281b32112be6065a75eb66e011363958b026cd69cf67864d6e472e6674b6efcc421400a72d358df2877dd0f01ff6be0d16f56