Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 13:30

General

  • Target

    0f047e39b8ae7813456cb1d4e592f59a_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    0f047e39b8ae7813456cb1d4e592f59a

  • SHA1

    bf044f69f1d16efdd17c19690e6ca065c62d664b

  • SHA256

    33c5d3f8f4030626a2cdfc91d48ae5b3d3a026bfc40910c2f81e9ffff8f7879b

  • SHA512

    0630bdea1db9bbaef3f551706a393856f6fb53123bac7090ad0bb6a3edfe245ded1b6893e5e460e4b45db3d31cac4c3cf9ebaf3749ca3c1ea73e065a32826fee

  • SSDEEP

    3072:NhSrFTmEvV0Wyw6iBIi+s+paYm3v/UjIbp1Nh01mGYkzGmNQEw:NhSrFTmdidm9IbFm1mGYVmNb

Malware Config

Extracted

Family

latentbot

C2

cybergateperez.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f047e39b8ae7813456cb1d4e592f59a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f047e39b8ae7813456cb1d4e592f59a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4740-0-0x0000000074E72000-0x0000000074E73000-memory.dmp

    Filesize

    4KB

  • memory/4740-1-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/4740-2-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/4740-3-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/4740-4-0x0000000074E72000-0x0000000074E73000-memory.dmp

    Filesize

    4KB

  • memory/4740-5-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/4740-6-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB

  • memory/4740-7-0x0000000074E70000-0x0000000075421000-memory.dmp

    Filesize

    5.7MB