Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2025 09:25

General

  • Target

    JaffaCakes118_55407673b4b0f8e4b70f84e023e6c5c8.exe

  • Size

    636KB

  • MD5

    55407673b4b0f8e4b70f84e023e6c5c8

  • SHA1

    8d8d3cf881ab164a82607aab62c10500c7a6c94f

  • SHA256

    422bc3be6b70dd7785780738ce03ca2a4483cb85bcfc4543bc056b9dd32b9a34

  • SHA512

    4cc32dd8951832d2d278e20013be15c0859ef41ec1f6318aa7832e8184ba5be37a7f85c5daa330df2ddaf01142c16e21fc828b4a47c89d9ab71de9e34c2b2511

  • SSDEEP

    12288:rqeIFfwruh1+087bqqPimMDltarvgjn7V+9yaEll:2ejrAEB3M3Wv+7M9ql

Malware Config

Extracted

Family

latentbot

C2

rscashmoneyheros.zapto.org

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 17 IoCs
  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_55407673b4b0f8e4b70f84e023e6c5c8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_55407673b4b0f8e4b70f84e023e6c5c8.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2652
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\VRDAXNOELY.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\VRDAXNOELY.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\VRDAXNOELY.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\VRDAXNOELY.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\WindowsCodecs.dll

    Filesize

    15KB

    MD5

    8d0a509b3ff7eb2945424f5f11474a0f

    SHA1

    a781cda1d9225095bbfcf7198d932146df6ab83a

    SHA256

    65c7dd8f275c90f5c65ac207c11735868b15a27ab6d692f2169af38b2672db4e

    SHA512

    d76c4718a890cadbc03fac07d8c31703645cac70be51250198f4ee83189addbe27252a5553100911d2d591440cf5bd54e075264e78609df864bf92bf334d0c3b

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    16KB

    MD5

    7cb97dcfc4a7f5094d7f527c2b1c4ff3

    SHA1

    f2ccbfe8f9aec22e8ccf553608b440832286e159

    SHA256

    d62c8c858e99c7c53eef778053bf52f96fec6490eb6efca9a92fbba2757e9521

    SHA512

    614ddd220c30ca122bd7d50adb02e7b6d1e36ef7d5d7f8eed441bbd09d0617fd3548f3fe34c6f0200deb9db6ac825cfe1e985fd6dcffce28493260dc85797c4d

  • memory/1060-48-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-54-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-56-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-26-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1060-23-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-21-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-19-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-36-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-37-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-57-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-39-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-45-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-44-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-40-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-46-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-53-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-49-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-50-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1060-52-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2360-0-0x0000000074831000-0x0000000074832000-memory.dmp

    Filesize

    4KB

  • memory/2360-3-0x0000000074830000-0x0000000074DDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2360-1-0x0000000074830000-0x0000000074DDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2360-38-0x0000000074830000-0x0000000074DDB000-memory.dmp

    Filesize

    5.7MB