Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe
-
Size
104KB
-
MD5
8ab005fa32ecaf0b7050c8123a1d76c0
-
SHA1
b96f593d442699892525b71486f9e3b980409079
-
SHA256
03e9766f9ee13cd36947ed60a91193ad0aa423071e620cdffab9ad4babdc1e44
-
SHA512
33e559a54fa07ab20f64d3de2a829e0ae1881f72355ae3a6bee90b44c3523edf39aac30b3057d95fc768f430532cd6be0e93706ca26f5c53ac1b04b37c241333
-
SSDEEP
1536:ueB11wAeGAB+4T6qZSVhIitZmcB3CQlwDwX3X/Ml4W4jEgLgSIREI:V1w9846qDitZLRCQlwDwXUl4ugdI
Malware Config
Extracted
latentbot
bkr33zysucksdick.zapto.org
Signatures
-
Latentbot family
-
Executes dropped EXE 4 IoCs
pid Process 3692 raidhost.exe 2640 raidhost.exe 2340 raidhost.exe 4640 raidhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\raidhost = "raidhost.exe" JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4824 set thread context of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 3692 set thread context of 2640 3692 raidhost.exe 91 PID 2340 set thread context of 4640 2340 raidhost.exe 93 -
resource yara_rule behavioral2/memory/1956-3-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1956-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1956-7-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1956-5-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1956-9-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-23-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-43-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-44-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4640-45-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-46-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-53-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-54-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-55-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-56-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-57-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-58-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-59-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-60-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-61-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-62-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-63-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2640-64-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\raidhost.exe JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe File created C:\Windows\raidhost.exe JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raidhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raidhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raidhost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 3692 raidhost.exe 2340 raidhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 4824 wrote to memory of 1956 4824 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 87 PID 1956 wrote to memory of 3692 1956 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 89 PID 1956 wrote to memory of 3692 1956 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 89 PID 1956 wrote to memory of 3692 1956 JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe 89 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 3692 wrote to memory of 2640 3692 raidhost.exe 91 PID 1848 wrote to memory of 2340 1848 cmd.exe 92 PID 1848 wrote to memory of 2340 1848 cmd.exe 92 PID 1848 wrote to memory of 2340 1848 cmd.exe 92 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93 PID 2340 wrote to memory of 4640 2340 raidhost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ab005fa32ecaf0b7050c8123a1d76c0.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\raidhost.exe"C:\Windows\raidhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\raidhost.exe"C:\Windows\raidhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c raidhost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\raidhost.exeraidhost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\raidhost.exe"C:\Windows\raidhost.exe"3⤵
- Executes dropped EXE
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD58ab005fa32ecaf0b7050c8123a1d76c0
SHA1b96f593d442699892525b71486f9e3b980409079
SHA25603e9766f9ee13cd36947ed60a91193ad0aa423071e620cdffab9ad4babdc1e44
SHA51233e559a54fa07ab20f64d3de2a829e0ae1881f72355ae3a6bee90b44c3523edf39aac30b3057d95fc768f430532cd6be0e93706ca26f5c53ac1b04b37c241333