Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe
-
Size
368KB
-
MD5
e432cebb34cc6c04759a8c48d848a3e3
-
SHA1
c30a8a53ae2a3ff7ed3139ad0ad8c98cb678d4ce
-
SHA256
38e9db65cc45506161d779d032df7f2e8e0d288af6c430ed2a35db104d1dcc6c
-
SHA512
17757062d4df8e3c068ca9b62c90783f33b866e3a70346cc0d70bfb178e4172adae5aeb34e5c3ac9b70dfa540a3eace072d3f509efd53b99bf3714bfc82450d4
-
SSDEEP
6144:8cCz6qyCkpVXdvJP2GymFCU+4VTdEKtgtTjr2y:8cCz6qpkpVlJOjUCUBVTOj
Malware Config
Extracted
latentbot
xporphyriax.zapto.org
Signatures
-
Latentbot family
-
Executes dropped EXE 1 IoCs
pid Process 2544 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1932 2596 e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2544 1932 vbc.exe 31 PID 1932 wrote to memory of 2544 1932 vbc.exe 31 PID 1932 wrote to memory of 2544 1932 vbc.exe 31 PID 1932 wrote to memory of 2544 1932 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e432cebb34cc6c04759a8c48d848a3e3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98