Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
fda26ab58b66096bdd8f8e1cb79569c7
-
SHA1
d581aa899a4379b39eabd7101c1c5dbfc2c20e75
-
SHA256
c9f50f5cecae36801a6af58c4a963677ac841bd906c9610c81a9459aa4fea12a
-
SHA512
47e0928bc7cbbf6b06e8b6a7e6167005cda7303d04e600f015fe8c4282202b123726c1fbc4b856a55eceed6d12b02a72b12f31bce3f0956e40bcdf2e97a4d90d
-
SSDEEP
49152:Nn9GKSIFhfZRN9pEtAfzrPi37NzHDA6Y0dsfofPB:XnPN9eczrPi37NzHDA6Y0dsfox
Malware Config
Extracted
latentbot
yeniceriler.zapto.org
Signatures
-
Latentbot family
-
Executes dropped EXE 2 IoCs
pid Process 2944 RUNDLL.EXE 2928 UNINS000.EXE -
Loads dropped DLL 5 IoCs
pid Process 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 2944 RUNDLL.EXE 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 2928 UNINS000.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll = "\"C:\\Users\\Admin\\AppData\\Roaming\\rundll.exe \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNDLL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UNINS000.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2624 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 2944 RUNDLL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2944 RUNDLL.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2944 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2944 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2944 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2944 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2928 2680 fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe 31 PID 2944 wrote to memory of 2628 2944 RUNDLL.EXE 32 PID 2944 wrote to memory of 2628 2944 RUNDLL.EXE 32 PID 2944 wrote to memory of 2628 2944 RUNDLL.EXE 32 PID 2944 wrote to memory of 2628 2944 RUNDLL.EXE 32 PID 2628 wrote to memory of 2604 2628 cmd.exe 34 PID 2628 wrote to memory of 2604 2628 cmd.exe 34 PID 2628 wrote to memory of 2604 2628 cmd.exe 34 PID 2628 wrote to memory of 2604 2628 cmd.exe 34 PID 2604 wrote to memory of 2624 2604 cmd.exe 35 PID 2604 wrote to memory of 2624 2604 cmd.exe 35 PID 2604 wrote to memory of 2624 2604 cmd.exe 35 PID 2604 wrote to memory of 2624 2604 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fda26ab58b66096bdd8f8e1cb79569c7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2624
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\UNINS000.EXE"C:\Users\Admin\AppData\Roaming\UNINS000.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD56b8393408a3f2df19ff1e68a4f720729
SHA103cbc980dd47a33bdfa18be80cbd3efdbbaf95c6
SHA256623fecae412449f60ffd8f38862e73504124afb0754952a45103daff0de5a7c9
SHA512235e3c1f0074282c8cd8d6d9b6dc0c71ae591f5ca6a2f2248f832359a1a452cfce26b5f80fddc5acd5aae811630441b640212b9b7a885f2d69e67813d8d846ca
-
Filesize
679KB
MD50d44ba4db9a8f05b293ea264075b31dd
SHA1e894fcf4c0c3718021eb8d72e0d34c7d9b7cfd0c
SHA256aaae5d9d6783e9248919b1ad7b5f46b2b545e7d3faa59c864c485b61f1ad0973
SHA51221126a90a24ffc494f97eb34c9d2139b052dd586638618bda9d2c296c4844a6e7b1cb3e0f84315ae3f1b5c0cfe0d39c8f60d9a1fcc88c7167e69746da9cba776
-
Filesize
495KB
MD555b218cafac2281a0d3ba330e8c4930b
SHA1b145044d120088be49f1c5d378b86560e69b1eb3
SHA25672d99aa9b9f1f3c675c185fe983e303afecf4e8971e2e83d41b062c3588866a4
SHA512f106a6950f8ce1f432a7fb15051c8dd787b68b3151739d58aecc5ed69500dfb9c695a6d203e0f2d2746bc83074243dc835275a24353bdc0f64917cc38b437206
-
Filesize
512KB
MD5bc135565b79d80459045107690f8d840
SHA1e5daed1f571719a01ac6bae7c09044c0751492b5
SHA256dec0d5991ccd586dc1c4840b667643c92a93a8c0f2c68d84d32c140e1785c3e4
SHA5121a91089a5661ae54b40323021fea7e941e1a7b3894b5ecda3d3fda7fc4320247ef258688970edf3192a3a0d12ec8881e5795fd8b7bf08404191691b727784f03