Analysis

  • max time kernel
    148s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 19:07

General

  • Target

    839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    839f5ff107b46c8b78d477f1439cdf39

  • SHA1

    ec84bc483e5ec9c443c787c3e49215a47e6eca68

  • SHA256

    81043d92ed7cbbb062c61a78e1ccd3d9a038f9d26a4527ae575832f2f9b56a09

  • SHA512

    7675487d812498ab416fbb40028b5a37faf5631d1737eaa3f91274d4536a91471ef1e19857473c00a0c4c0c094745b86f9a2cb13a4490356f944403c4262bb3d

  • SSDEEP

    49152:OfHQZsWSMjaQv77HteKpSqeIHY7soObOGvvm1Tx9uiGhUlSAZ2CNgMtN:Ok3aQv7hp67s5OUvmn9udB1/MtN

Malware Config

Extracted

Family

latentbot

C2

lovelybones.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 676
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\is-HIC7P.tmp\is-58164.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-HIC7P.tmp\is-58164.tmp" /SL4 $60152 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE" 2732289 52224
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE

    Filesize

    2.8MB

    MD5

    fa770683d20f1900d9c9ea170519d524

    SHA1

    614ba24b671c7c0efd3614874f6fed8f6cb8cdcc

    SHA256

    292fa280d62a9a8b7f6dbcbf925bee608328bed641377dc8803ad54c4315a10e

    SHA512

    b31a1246017e421c4fcbb170fc8979f6da742d06dc706a759489508e50e36427e0293fd8baa7508515a943fa1618fad905994bd0a9ea920d5a4141b0778372f1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE

    Filesize

    700KB

    MD5

    53e20136fde828389300216192e06590

    SHA1

    95bfd1348116ead9b952e19372c4107a08b8582d

    SHA256

    7149a4adcbbda8dc77124811e8dfa001d15f5405db6fd67a6dea8bd43abccbae

    SHA512

    83509f1f323ef28918193e6087864ca2199219c682f08dd8be6be0becb4ec24796761cba31d0c6590b543246597c6f3b97de30e4bf8ee5cdaabee5fbca264661

  • \Users\Admin\AppData\Local\Temp\is-7ME5H.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-HIC7P.tmp\is-58164.tmp

    Filesize

    642KB

    MD5

    3c9f925549a51f9017e08a072332fa47

    SHA1

    1bff860e744467a58ef986b1016a4454844f5ad7

    SHA256

    1eb6ba689a47d91d01c9b3caa93daacec49c7b6daafb217678b9ad8f545c8ac2

    SHA512

    86112ec0d9f4254bceb0a576bc03e09384a15a4a5e94b08ca65ddfbc60d9d8d459885138c2644c9309ac86bca0b86d41c92dbc8ed23d7d381cdbeb2d7963ec18

  • memory/1884-11-0x0000000074012000-0x0000000074014000-memory.dmp

    Filesize

    8KB

  • memory/2372-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2372-34-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2884-41-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-49-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-39-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-35-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-43-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-45-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-47-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-37-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-51-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-53-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-55-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-57-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-59-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2884-61-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB