Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 04:09

General

  • Target

    1df3e22f5fc25ab21e3fb89684818d46_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    1df3e22f5fc25ab21e3fb89684818d46

  • SHA1

    d72729754bd91f0f1d0b039583c28f7d03839523

  • SHA256

    8f4d46ef3df58b4b056302f5128dea4406c5ec321ca0aef51b61240cada41126

  • SHA512

    61fbdecae71346359aaac42f50323be0180459c8b573376b2e1fe1af7a82dc023f970d18f14db1ba950a5a4c898ef66a1bf27380534d08bdf334d83a071ba8ca

  • SSDEEP

    24576:Xj+kb1dw1UFbU8u6gM+7gG1xM5hCN4vph0RMj+kb1dw1UFbU8u6gM+7gG1xM5hC9:zHb1c6X+d/4308Hb1c6X+d/430B

Malware Config

Extracted

Family

latentbot

C2

nyandcompany.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1df3e22f5fc25ab21e3fb89684818d46_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1df3e22f5fc25ab21e3fb89684818d46_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rgoqahdm.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1346.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1345.tmp"
        3⤵
          PID:1364
      • C:\Users\Admin\AppData\Roaming\ctfmon.exe
        C:\Users\Admin\AppData\Roaming\ctfmon.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3468
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3648
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:3756
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\ctfmon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ctfmon.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\ctfmon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ctfmon.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2084
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:4068
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WindowsDef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsDef.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3688
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WindowsDef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsDef.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2812
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DNS.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /flushdnsipconfig/releaseipconfig/renew
          3⤵
          • Gathers network information
          PID:3752
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4584 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2188

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      Persistence

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Privilege Escalation

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Defense Evasion

      Modify Registry

      2
      T1112

      Impair Defenses

      1
      T1562

      Disable or Modify System Firewall

      1
      T1562.004

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DNS.bat
        Filesize

        47B

        MD5

        4b403bd7ff6fe021fcf3ecdd2c029f87

        SHA1

        890642fc02dbfffd5d3aef0ec652fa636a48c3ee

        SHA256

        267c9197388ab6b34c7516e728a3529df2b7aab5029588ffb47540bbe651f654

        SHA512

        3bdef29cfeab451d45182420bd179f9450a0da5c842992260a420728e212635f90cc1f394687c8ac852ccd8caf529e9bdb4aff24e2d07f6705594931b3ef5e6d

      • C:\Users\Admin\AppData\Local\Temp\RES1346.tmp
        Filesize

        1KB

        MD5

        40e702bf071b8acf21bdc9b7c6013d4b

        SHA1

        279afaf61f23cd821c77fe167b1ea1913f348a75

        SHA256

        b2c4cb910bfd26ec8a0c8ca212a59aa6d61d5b3019376ce1fab120351501404b

        SHA512

        d6fc78084536c80095151e95fb620c84f44d808f233136ad52f471eef809c61f5b5f6c45be7ace05875b8c13b6717cabdab76612389eb3f2eab208aa55cde967

      • C:\Users\Admin\AppData\Local\Temp\rgoqahdm.dll
        Filesize

        5KB

        MD5

        f93921628ab6745dcce5d6229e466d84

        SHA1

        7f4eb550b00c089f39e96598c0a85fee429ef58d

        SHA256

        bab1c3635793fb9e3af2c13365ec347a0dbbd78cea8a723e5d4161f5cc9b0105

        SHA512

        b65768873afb4536b37014cebd9bc297ebe6029743ab5d48d0946fab37b88c8cbc6dbfd1446d835ce7ab5c0561bb4b44077150c33cf3921e477ec7edbc3a6ebe

      • C:\Users\Admin\AppData\Roaming\ctfmon.exe
        Filesize

        420KB

        MD5

        13f3b14913321c0c5aa5187048713e16

        SHA1

        4627a45190f5799e0f58662592ead8c98159c4ac

        SHA256

        28fffccd6c5afef751399139e50f767d1253c4c95dcaa8f8dd355fbbdc04c9cd

        SHA512

        37c29eb996e4e1b15e456c17cbd539a3635e931f25091bb183e7aec8086364a61206f595f7da90e74d1cb16147a0c6f3cf010c7d56db41ca63c2b268db3c2772

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC1345.tmp
        Filesize

        652B

        MD5

        3c5a02822dc0afec24a4129c0472a489

        SHA1

        a6288a2235637a13e016c7638dd6e0e063ecc000

        SHA256

        3788f2ed9ab426fb012c087ea6d38a2d05b227ea40b55926c45ec2ac4e4e4e0e

        SHA512

        a342e838c13a05b24eb06b5e2cc87c3debedb517c9be9759c914b116cf887b159ce36ae934e93cf7f7a42dbf59bcd9b576f0077ed58a6c82f2ca4a07db2e9d5c

      • \??\c:\Users\Admin\AppData\Local\Temp\rgoqahdm.0.cs
        Filesize

        4KB

        MD5

        2216d197bc442e875016eba15c07a937

        SHA1

        37528e21ea3271b85d276c6bd003e6c60c81545d

        SHA256

        2e9e3da7bfa1334706550bb4d6269bf3e64cbbc09fa349af52eb22f32aebb4af

        SHA512

        7d7bdc3bf83ac0a29e917ead899dcaa1b47ee2660f405fe4883ca2a2546f7924265e1d75a2ea02c0e34fac4d2bb82bbaaa88d06c240afad4e9fd49337cd04d3f

      • \??\c:\Users\Admin\AppData\Local\Temp\rgoqahdm.cmdline
        Filesize

        206B

        MD5

        54efcf069db938b3fb295d5ac0c2da90

        SHA1

        4b5d9b0a9a78dab9cc698c3f867c3a0386ab419e

        SHA256

        57f1b2ea277af166a173fe7e93a831887187e9f7f12b92cb4b0a06b9dd8bfa99

        SHA512

        61246499ed08864566506ee72a8442ed5bfb85eefa7e8478233bf101c86aa6aa83e7273ff83a7731bc438fc7be7eb2a43ecb91218dc7f8cee2cfdbadf8ba922f

      • memory/1652-9-0x0000000074DE0000-0x0000000075391000-memory.dmp
        Filesize

        5.7MB

      • memory/1652-16-0x0000000074DE0000-0x0000000075391000-memory.dmp
        Filesize

        5.7MB

      • memory/3468-24-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-60-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-20-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-68-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-67-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-53-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-64-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-62-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-56-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-58-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/3468-59-0x0000000000400000-0x0000000000470000-memory.dmp
        Filesize

        448KB

      • memory/4188-1-0x0000000074DE0000-0x0000000075391000-memory.dmp
        Filesize

        5.7MB

      • memory/4188-55-0x0000000074DE0000-0x0000000075391000-memory.dmp
        Filesize

        5.7MB

      • memory/4188-54-0x0000000074DE2000-0x0000000074DE3000-memory.dmp
        Filesize

        4KB

      • memory/4188-2-0x0000000074DE0000-0x0000000075391000-memory.dmp
        Filesize

        5.7MB

      • memory/4188-0-0x0000000074DE2000-0x0000000074DE3000-memory.dmp
        Filesize

        4KB