Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
839f5ff107b46c8b78d477f1439cdf39
-
SHA1
ec84bc483e5ec9c443c787c3e49215a47e6eca68
-
SHA256
81043d92ed7cbbb062c61a78e1ccd3d9a038f9d26a4527ae575832f2f9b56a09
-
SHA512
7675487d812498ab416fbb40028b5a37faf5631d1737eaa3f91274d4536a91471ef1e19857473c00a0c4c0c094745b86f9a2cb13a4490356f944403c4262bb3d
-
SSDEEP
49152:OfHQZsWSMjaQv77HteKpSqeIHY7soObOGvvm1Tx9uiGhUlSAZ2CNgMtN:Ok3aQv7hp67s5OUvmn9udB1/MtN
Malware Config
Extracted
latentbot
lovelybones.zapto.org
Signatures
-
Latentbot family
-
Executes dropped EXE 3 IoCs
Processes:
UPDATE~1.EXEFAST_A~1.EXEis-58164.tmppid process 1884 UPDATE~1.EXE 2372 FAST_A~1.EXE 2884 is-58164.tmp -
Loads dropped DLL 10 IoCs
Processes:
UPDATE~1.EXEdw20.exeFAST_A~1.EXEis-58164.tmppid process 1884 UPDATE~1.EXE 1884 UPDATE~1.EXE 1884 UPDATE~1.EXE 2488 dw20.exe 2372 FAST_A~1.EXE 2372 FAST_A~1.EXE 2372 FAST_A~1.EXE 2372 FAST_A~1.EXE 2884 is-58164.tmp 2884 is-58164.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dw20.exeFAST_A~1.EXEis-58164.tmpUPDATE~1.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FAST_A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-58164.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPDATE~1.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
UPDATE~1.EXEdescription pid process Token: SeDebugPrivilege 1884 UPDATE~1.EXE Token: 33 1884 UPDATE~1.EXE Token: SeIncBasePriorityPrivilege 1884 UPDATE~1.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exeUPDATE~1.EXEFAST_A~1.EXEdescription pid process target process PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1940 wrote to memory of 1884 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe UPDATE~1.EXE PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1884 wrote to memory of 2488 1884 UPDATE~1.EXE dw20.exe PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 1940 wrote to memory of 2372 1940 839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe FAST_A~1.EXE PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp PID 2372 wrote to memory of 2884 2372 FAST_A~1.EXE is-58164.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 6763⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-HIC7P.tmp\is-58164.tmp"C:\Users\Admin\AppData\Local\Temp\is-HIC7P.tmp\is-58164.tmp" /SL4 $60152 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE" 2732289 522243⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5fa770683d20f1900d9c9ea170519d524
SHA1614ba24b671c7c0efd3614874f6fed8f6cb8cdcc
SHA256292fa280d62a9a8b7f6dbcbf925bee608328bed641377dc8803ad54c4315a10e
SHA512b31a1246017e421c4fcbb170fc8979f6da742d06dc706a759489508e50e36427e0293fd8baa7508515a943fa1618fad905994bd0a9ea920d5a4141b0778372f1
-
Filesize
700KB
MD553e20136fde828389300216192e06590
SHA195bfd1348116ead9b952e19372c4107a08b8582d
SHA2567149a4adcbbda8dc77124811e8dfa001d15f5405db6fd67a6dea8bd43abccbae
SHA51283509f1f323ef28918193e6087864ca2199219c682f08dd8be6be0becb4ec24796761cba31d0c6590b543246597c6f3b97de30e4bf8ee5cdaabee5fbca264661
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
642KB
MD53c9f925549a51f9017e08a072332fa47
SHA11bff860e744467a58ef986b1016a4454844f5ad7
SHA2561eb6ba689a47d91d01c9b3caa93daacec49c7b6daafb217678b9ad8f545c8ac2
SHA51286112ec0d9f4254bceb0a576bc03e09384a15a4a5e94b08ca65ddfbc60d9d8d459885138c2644c9309ac86bca0b86d41c92dbc8ed23d7d381cdbeb2d7963ec18