Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
0da06485fe542333d67855067eed6339_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0da06485fe542333d67855067eed6339_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0da06485fe542333d67855067eed6339_JaffaCakes118.exe
-
Size
443KB
-
MD5
0da06485fe542333d67855067eed6339
-
SHA1
216a30b8cafce120917000ead51015ba56100b8c
-
SHA256
3f85129c59dfdbdbb46638d05d7b3cbcb259ee6fdcd90bb9cf0c256976e04605
-
SHA512
ba6f2fe9a1078794238799d0cd647d245369b15ef99664b6c20067cdda9b695fcf70fcf27922c28041e5a5c3f3916f9509c8215f1cec5eb2f1e75e6f795b3d12
-
SSDEEP
12288:692J8GaNnYDKsC+v1yaVSjclCV3Li09zDT:EGSnYDKgv1yZn3
Malware Config
Extracted
trickbot
1000262
sun6
118.97.119.218:449
94.181.47.198:449
144.121.143.129:449
185.200.60.138:449
185.42.52.126:449
181.174.112.74:449
178.116.83.49:443
121.58.242.206:449
182.50.64.148:449
82.222.40.119:449
97.78.222.18:449
67.79.15.106:449
168.167.87.79:443
103.111.53.126:449
182.253.20.66:449
192.188.120.164:443
81.17.86.112:443
95.154.80.154:449
46.149.182.112:449
69.9.232.167:443
94.232.20.113:443
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
103.111.55.218:449
62.141.94.107:443
96.43.40.221:443
197.232.50.85:443
223.25.64.119:443
185.222.202.127:443
116.212.152.12:449
107.181.174.176:443
23.94.41.215:443
107.173.102.231:443
192.252.209.44:443
107.175.127.147:443
23.226.138.169:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1924-1-0x00000000004C0000-0x00000000004FD000-memory.dmp trickbot_loader32 behavioral1/memory/2528-17-0x00000000003C0000-0x00000000003FD000-memory.dmp trickbot_loader32 behavioral1/memory/1924-30-0x00000000004C0000-0x00000000004FD000-memory.dmp trickbot_loader32 behavioral1/memory/1924-29-0x0000000000400000-0x0000000000475000-memory.dmp trickbot_loader32 behavioral1/memory/2528-32-0x00000000003C0000-0x00000000003FD000-memory.dmp trickbot_loader32 behavioral1/memory/2528-31-0x0000000000400000-0x0000000000475000-memory.dmp trickbot_loader32 behavioral1/memory/2164-47-0x0000000000400000-0x0000000000475000-memory.dmp trickbot_loader32 -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
0da07496fe642333d78966078eed7339_KaffaDaket119.exe0da07496fe642333d78966078eed7339_KaffaDaket119.exepid process 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe 2164 0da07496fe642333d78966078eed7339_KaffaDaket119.exe -
Loads dropped DLL 2 IoCs
Processes:
0da06485fe542333d67855067eed6339_JaffaCakes118.exepid process 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ipinfo.io -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2672 sc.exe 2828 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0da06485fe542333d67855067eed6339_JaffaCakes118.exepowershell.exepid process 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 2512 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exe0da07496fe642333d78966078eed7339_KaffaDaket119.exedescription pid process Token: SeDebugPrivilege 2512 powershell.exe Token: SeTcbPrivilege 2164 0da07496fe642333d78966078eed7339_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0da06485fe542333d67855067eed6339_JaffaCakes118.execmd.execmd.execmd.exe0da07496fe642333d78966078eed7339_KaffaDaket119.exedescription pid process target process PID 1924 wrote to memory of 2808 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2808 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2808 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2808 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 1724 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 1724 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 1724 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 1724 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2916 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2916 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2916 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2916 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe cmd.exe PID 1924 wrote to memory of 2528 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 0da07496fe642333d78966078eed7339_KaffaDaket119.exe PID 1924 wrote to memory of 2528 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 0da07496fe642333d78966078eed7339_KaffaDaket119.exe PID 1924 wrote to memory of 2528 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 0da07496fe642333d78966078eed7339_KaffaDaket119.exe PID 1924 wrote to memory of 2528 1924 0da06485fe542333d67855067eed6339_JaffaCakes118.exe 0da07496fe642333d78966078eed7339_KaffaDaket119.exe PID 1724 wrote to memory of 2672 1724 cmd.exe sc.exe PID 1724 wrote to memory of 2672 1724 cmd.exe sc.exe PID 1724 wrote to memory of 2672 1724 cmd.exe sc.exe PID 1724 wrote to memory of 2672 1724 cmd.exe sc.exe PID 2808 wrote to memory of 2828 2808 cmd.exe sc.exe PID 2808 wrote to memory of 2828 2808 cmd.exe sc.exe PID 2808 wrote to memory of 2828 2808 cmd.exe sc.exe PID 2808 wrote to memory of 2828 2808 cmd.exe sc.exe PID 2916 wrote to memory of 2512 2916 cmd.exe powershell.exe PID 2916 wrote to memory of 2512 2916 cmd.exe powershell.exe PID 2916 wrote to memory of 2512 2916 cmd.exe powershell.exe PID 2916 wrote to memory of 2512 2916 cmd.exe powershell.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe PID 2528 wrote to memory of 2716 2528 0da07496fe642333d78966078eed7339_KaffaDaket119.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da06485fe542333d67855067eed6339_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0da06485fe542333d67855067eed6339_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\mssert\0da07496fe642333d78966078eed7339_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\mssert\0da07496fe642333d78966078eed7339_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {2210F2ED-18DE-470D-B504-4C1BCB39DE4D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Users\Admin\AppData\Roaming\mssert\0da07496fe642333d78966078eed7339_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\mssert\0da07496fe642333d78966078eed7339_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2297530677-1229052932-2803917579-1000\0f5007522459c86e95ffcc62f32308f1_63be8c66-23f0-4400-84bb-c1a439222555Filesize
1KB
MD5981fbbb85253cd09b2b801c75db07f72
SHA1739b48a2870123f62b3e2ec610512c99d38257c3
SHA25662572e6f01d92e887f639f06fd4614c3394381977f49d4dc3c30c88ce8237a8a
SHA512a413e5e8d72428c848ebb0ce3dd5a66c1b50550d9904b843cb398262263587e4d734ceef55bf9be9daee1f6d9e39e0c664f6ee0229d8d8f6988051a4a9112dfd
-
\Users\Admin\AppData\Roaming\mssert\0da07496fe642333d78966078eed7339_KaffaDaket119.exeFilesize
443KB
MD50da06485fe542333d67855067eed6339
SHA1216a30b8cafce120917000ead51015ba56100b8c
SHA2563f85129c59dfdbdbb46638d05d7b3cbcb259ee6fdcd90bb9cf0c256976e04605
SHA512ba6f2fe9a1078794238799d0cd647d245369b15ef99664b6c20067cdda9b695fcf70fcf27922c28041e5a5c3f3916f9509c8215f1cec5eb2f1e75e6f795b3d12
-
memory/1924-30-0x00000000004C0000-0x00000000004FD000-memory.dmpFilesize
244KB
-
memory/1924-1-0x00000000004C0000-0x00000000004FD000-memory.dmpFilesize
244KB
-
memory/1924-29-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2032-40-0x0000000140000000-0x0000000140035000-memory.dmpFilesize
212KB
-
memory/2164-47-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2528-32-0x00000000003C0000-0x00000000003FD000-memory.dmpFilesize
244KB
-
memory/2528-13-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/2528-12-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/2528-17-0x00000000003C0000-0x00000000003FD000-memory.dmpFilesize
244KB
-
memory/2528-31-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2528-18-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/2716-26-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/2716-19-0x0000000140000000-0x0000000140035000-memory.dmpFilesize
212KB
-
memory/2716-20-0x0000000140000000-0x0000000140035000-memory.dmpFilesize
212KB