General

  • Target

    54e8fbf0609b77a33c5b9d939fc19d15_JaffaCakes118

  • Size

    535KB

  • Sample

    240518-qk4jwadd63

  • MD5

    54e8fbf0609b77a33c5b9d939fc19d15

  • SHA1

    60043193630412e9b006e6d4a5334375ffe871ed

  • SHA256

    aa95c0aa1fa6efb5123d150ce2cf9eae860cf15391b21560fd79088a84fbcd99

  • SHA512

    1e9382482d4adadaa27870095756d348c035c046a6ae8b6a4c59ba037ce2fa4af4493fe150d54f39be5239eee2e4db5a287538faffc864c9b68ff07e0255e5bc

  • SSDEEP

    12288:Qru1rDT5oxTPErT8ApZh+cTClRqcLdjKJO9xNiVwPYVYZ6CV9:1axbKDZhzClRXKc/iJs

Malware Config

Extracted

Family

latentbot

C2

ebukaalilonu.zapto.org

Targets

    • Target

      54e8fbf0609b77a33c5b9d939fc19d15_JaffaCakes118

    • Size

      535KB

    • MD5

      54e8fbf0609b77a33c5b9d939fc19d15

    • SHA1

      60043193630412e9b006e6d4a5334375ffe871ed

    • SHA256

      aa95c0aa1fa6efb5123d150ce2cf9eae860cf15391b21560fd79088a84fbcd99

    • SHA512

      1e9382482d4adadaa27870095756d348c035c046a6ae8b6a4c59ba037ce2fa4af4493fe150d54f39be5239eee2e4db5a287538faffc864c9b68ff07e0255e5bc

    • SSDEEP

      12288:Qru1rDT5oxTPErT8ApZh+cTClRqcLdjKJO9xNiVwPYVYZ6CV9:1axbKDZhzClRXKc/iJs

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • UAC bypass

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

4
T1112

File and Directory Permissions Modification

1
T1222

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Impact

Inhibit System Recovery

1
T1490

Tasks