Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 19:07

General

  • Target

    839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    839f5ff107b46c8b78d477f1439cdf39

  • SHA1

    ec84bc483e5ec9c443c787c3e49215a47e6eca68

  • SHA256

    81043d92ed7cbbb062c61a78e1ccd3d9a038f9d26a4527ae575832f2f9b56a09

  • SHA512

    7675487d812498ab416fbb40028b5a37faf5631d1737eaa3f91274d4536a91471ef1e19857473c00a0c4c0c094745b86f9a2cb13a4490356f944403c4262bb3d

  • SSDEEP

    49152:OfHQZsWSMjaQv77HteKpSqeIHY7soObOGvvm1Tx9uiGhUlSAZ2CNgMtN:Ok3aQv7hp67s5OUvmn9udB1/MtN

Malware Config

Extracted

Family

latentbot

C2

lovelybones.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\839f5ff107b46c8b78d477f1439cdf39_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1052
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Users\Admin\AppData\Local\Temp\is-4G3UL.tmp\is-LE4TO.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-4G3UL.tmp\is-LE4TO.tmp" /SL4 $50092 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE" 2732289 52224
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FAST_A~1.EXE

    Filesize

    2.8MB

    MD5

    fa770683d20f1900d9c9ea170519d524

    SHA1

    614ba24b671c7c0efd3614874f6fed8f6cb8cdcc

    SHA256

    292fa280d62a9a8b7f6dbcbf925bee608328bed641377dc8803ad54c4315a10e

    SHA512

    b31a1246017e421c4fcbb170fc8979f6da742d06dc706a759489508e50e36427e0293fd8baa7508515a943fa1618fad905994bd0a9ea920d5a4141b0778372f1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UPDATE~1.EXE

    Filesize

    700KB

    MD5

    53e20136fde828389300216192e06590

    SHA1

    95bfd1348116ead9b952e19372c4107a08b8582d

    SHA256

    7149a4adcbbda8dc77124811e8dfa001d15f5405db6fd67a6dea8bd43abccbae

    SHA512

    83509f1f323ef28918193e6087864ca2199219c682f08dd8be6be0becb4ec24796761cba31d0c6590b543246597c6f3b97de30e4bf8ee5cdaabee5fbca264661

  • C:\Users\Admin\AppData\Local\Temp\is-4G3UL.tmp\is-LE4TO.tmp

    Filesize

    642KB

    MD5

    3c9f925549a51f9017e08a072332fa47

    SHA1

    1bff860e744467a58ef986b1016a4454844f5ad7

    SHA256

    1eb6ba689a47d91d01c9b3caa93daacec49c7b6daafb217678b9ad8f545c8ac2

    SHA512

    86112ec0d9f4254bceb0a576bc03e09384a15a4a5e94b08ca65ddfbc60d9d8d459885138c2644c9309ac86bca0b86d41c92dbc8ed23d7d381cdbeb2d7963ec18

  • memory/2140-7-0x0000000074872000-0x0000000074873000-memory.dmp

    Filesize

    4KB

  • memory/2140-8-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-9-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-16-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2932-48-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-44-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-58-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-32-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-34-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-36-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-38-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-40-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-42-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-56-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-46-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-54-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-50-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2932-52-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/4392-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4392-22-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/4392-31-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB