Analysis

  • max time kernel
    115s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 18:49

General

  • Target

    0d53d5d9268cd120887d6d1a687e1b86_JaffaCakes118.exe

  • Size

    868KB

  • MD5

    0d53d5d9268cd120887d6d1a687e1b86

  • SHA1

    5dcbfbb40e7fc2d2579680a44cbfa641e1b283f8

  • SHA256

    781524ba173e787e96c6879a0cacc597507218ca2b7e53ee35b8ccc72284bc5b

  • SHA512

    0c04f7bca62d18aa2fa92f910e9224c0ad83526bf0f7f832ca0778d7c29cc3e399a1e81308cd0dfe6492b00ab4a0742f8923e71d650bd82a9ccfc5af8661cad1

  • SSDEEP

    12288:0cfkUmruxF02xWt5bSoV/XHx8B8a4TrTEChqNi9rkQ/H:KI02x+LXHqB8aErPqCFH

Malware Config

Extracted

Family

trickbot

Version

2000035

Botnet

lib166

C2

36.91.117.231:443

36.89.228.201:443

103.75.32.173:443

45.115.172.105:443

36.95.23.89:443

103.123.86.104:443

202.65.119.162:443

202.9.121.143:443

139.255.65.170:443

110.172.137.20:443

103.146.232.154:443

36.91.88.164:443

103.47.170.131:443

122.117.90.133:443

103.9.188.78:443

210.2.149.202:443

118.91.190.42:443

117.222.61.115:443

117.222.57.92:443

136.228.128.21:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d53d5d9268cd120887d6d1a687e1b86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d53d5d9268cd120887d6d1a687e1b86_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\system32\wermgr.exe
      C:\Windows\system32\wermgr.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:820
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe
      2⤵
        PID:3940
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4172 --field-trial-handle=2280,i,8281149332300504990,9122875031903898779,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2872

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/820-9-0x0000012921DB0000-0x0000012921DB1000-memory.dmp

              Filesize

              4KB

            • memory/820-10-0x0000012921C10000-0x0000012921C39000-memory.dmp

              Filesize

              164KB

            • memory/820-13-0x0000012921C10000-0x0000012921C39000-memory.dmp

              Filesize

              164KB

            • memory/2696-0-0x0000000002380000-0x00000000023BF000-memory.dmp

              Filesize

              252KB

            • memory/2696-2-0x0000000002330000-0x000000000236C000-memory.dmp

              Filesize

              240KB

            • memory/2696-5-0x00000000023C0000-0x00000000023FA000-memory.dmp

              Filesize

              232KB

            • memory/2696-6-0x00000000023C0000-0x00000000023FA000-memory.dmp

              Filesize

              232KB

            • memory/2696-7-0x0000000002610000-0x0000000002611000-memory.dmp

              Filesize

              4KB

            • memory/2696-8-0x0000000010000000-0x0000000010003000-memory.dmp

              Filesize

              12KB

            • memory/2696-11-0x0000000002310000-0x0000000002321000-memory.dmp

              Filesize

              68KB

            • memory/2696-12-0x00000000023C0000-0x00000000023FA000-memory.dmp

              Filesize

              232KB