Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
1055352791c46b8a94ef0372c6ed19ab
-
SHA1
50ae3bf5596a3f3a8603041a8b682d0bd4c18fad
-
SHA256
6db86df6a4d4a4f7f1988bf9a0138cec8ad6526491f7114bbb88e752798b77b0
-
SHA512
9a0975e2a70d9266019124561362e8286945efd3455b24f73da0a7f3a50571e88737207e70710b0a62572d976ec593836b7654ad03a09c8dbf35b8ad5d48ad58
-
SSDEEP
24576:CupRi52nSVkBIEWYzIDM6z185HhTD9Ctpr0hNSNV0M:C5VkB5oM7JBCtF9
Malware Config
Extracted
latentbot
hackerlamer.zapto.org
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
FileName.exeFileName.exeFileName.exeFileName.exepid Process 2988 FileName.exe 3664 FileName.exe 3796 FileName.exe 2760 FileName.exe -
Loads dropped DLL 5 IoCs
Processes:
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exepid Process 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\FileName.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exeFileName.exedescription pid Process procid_target PID 2904 set thread context of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 set thread context of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2988 set thread context of 3664 2988 FileName.exe 35 PID 2988 set thread context of 3796 2988 FileName.exe 36 PID 2988 set thread context of 2760 2988 FileName.exe 37 -
Processes:
resource yara_rule behavioral1/memory/2780-673-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1036-672-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1036-681-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/3664-1341-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/3664-1317-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/3796-1475-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2780-1501-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3796-1507-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FileName.exeFileName.exereg.exeFileName.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exeDllHost.execmd.exeFileName.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
FileName.exedescription pid Process Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe Token: SeDebugPrivilege 3796 FileName.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 832 DllHost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exeFileName.exeFileName.exeFileName.exeDllHost.exepid Process 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 1036 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 2988 FileName.exe 3664 FileName.exe 3796 FileName.exe 832 DllHost.exe 832 DllHost.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.execmd.exeFileName.exedescription pid Process procid_target PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 1036 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2780 2904 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 29 PID 2780 wrote to memory of 672 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 31 PID 2780 wrote to memory of 672 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 31 PID 2780 wrote to memory of 672 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 31 PID 2780 wrote to memory of 672 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 31 PID 672 wrote to memory of 1684 672 cmd.exe 33 PID 672 wrote to memory of 1684 672 cmd.exe 33 PID 672 wrote to memory of 1684 672 cmd.exe 33 PID 672 wrote to memory of 1684 672 cmd.exe 33 PID 2780 wrote to memory of 2988 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 34 PID 2780 wrote to memory of 2988 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 34 PID 2780 wrote to memory of 2988 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 34 PID 2780 wrote to memory of 2988 2780 1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe 34 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3664 2988 FileName.exe 35 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 3796 2988 FileName.exe 36 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37 PID 2988 wrote to memory of 2760 2988 FileName.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KYXJR.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1684
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3796
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD54bf6b33ec4e30bb63085fcb4d8b7c0eb
SHA178f20cee659432f1218290ff2fed3b53a2b4ad1d
SHA256d34fe2b88f3208d4160bc7576f29df889a2db9de3139cb0dccc172eae79a9345
SHA5121a7d75e5e15fc1ef704a184a1f66c56a870478ec278d45a8d11f8b039943d2a49cc4a26b394eb9313a8edaf80cec38db34b2de25537c34629ff090b187d48d1a
-
Filesize
149B
MD5a7721cdbbbba65653ea208cb8193d12b
SHA1ddf61419fa642e1176c559790138e3a0ee898c65
SHA256d2336e875fe13cec23a748d16db82a25ba2dff3ec8f7477e84c4121f4d2a6847
SHA51212fbec3ddb7eb7da28a12889a32f4f2aeb20bab9564d876760f82f7615c017b592381ab6ba3d945ffdeba86a150f54ccbdfa961580b74fa6692fbcbb24b11bb6
-
Filesize
1.1MB
MD58094dcaf055d2d75a152e04ef5180beb
SHA1e046f94495d76fcc15f9d32a5537a28967112a5f
SHA2560c7fdb5bf460cadbaefcc997a8152d67f751afcbda18e9bd25e1f1fddc1ce273
SHA5126d2bbeabb4ac3ce01b0f86e2c801a590c1064c05458a6ecf41b6ea2225c72503b05895a3368ef5807ff98394966b950ce6ab31ce9dce21eb2b8663f06edc4b33