Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe
-
Size
508KB
-
MD5
22161c0055fc01c0eca69127341c3e57
-
SHA1
f9cba47d308c75bc02b4b15e757fd059e975de2a
-
SHA256
12fb64c38d06802aa80fefb80c7f21431c5377d060201550853eb5d7a054fe51
-
SHA512
4bd932ba64dc4a5126cea52311f019b204d07f5221d3eddefa3444b9b4d628c630076c25443833d63f598bb95250a3c698e0d75ecd58313b8e658881fda36f84
-
SSDEEP
6144:AIpmP7lVNrtSPQFUPJVRMgBT4TSnOsAtYBPfWdgyJHBZ67SnSEnV29vwvlC:hwlVNrgyAVugBTIO+t6fatBDOmlC
Malware Config
Extracted
trickbot
1000316
lib372
104.168.58.38:443
24.247.181.155:449
24.247.182.39:449
107.174.34.202:443
24.247.182.29:449
24.247.182.179:449
198.46.131.164:443
74.132.135.120:449
198.46.160.217:443
71.94.101.25:443
24.247.182.225:449
192.3.52.107:443
74.140.160.33:449
65.31.241.133:449
140.190.54.187:449
24.247.181.226:449
108.160.196.130:449
89.46.222.239:443
24.247.182.174:449
108.174.60.161:443
75.108.123.165:449
72.189.124.41:449
105.27.171.234:449
172.222.97.179:449
72.241.62.188:449
198.46.198.241:443
199.227.126.250:449
97.87.172.0:449
94.232.20.113:443
24.247.182.159:449
47.49.168.50:443
64.128.175.37:449
24.227.222.4:449
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4440-17-0x0000000003370000-0x00000000033B0000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exepid process 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\WinDefrag\22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefrag\\22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe" svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exepid process 4440 22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exedescription pid process target process PID 4440 wrote to memory of 1504 4440 22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe PID 4440 wrote to memory of 1504 4440 22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe PID 4440 wrote to memory of 1504 4440 22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe PID 1504 wrote to memory of 3920 1504 22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22161c0055fc01c0eca69127341c3e57_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinDefrag\22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WinDefrag\22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
-
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵
-
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp051Filesize
67B
MD5e4bcd320585af9f77671cc6e91fe9de6
SHA115f12439eb3e133affb37b29e41e57d89fc90e06
SHA256a1e0f5a9cfc9615222f04e65455c7c4c1ba86710275afffd472428a293c31ec8
SHA51200497885531c0b84fe869828e5f2c0631f2f175f961c62175736487ae703252ba7393f882ffe99d8c4bcdb951172e35daa9ca41f45e64ce97fbae7721b25c112
-
C:\Users\Admin\AppData\Local\Temp\tmp051Filesize
67B
MD558b2f90cc0182925ae0bab51700b14ab
SHA1d2975adeb8dc68f2f5e10edee524de78e79828db
SHA2568114822fe9a58e5ba08abb480dd595109c66a49d9afc404f85843915694c2964
SHA512de6154d3d44c7e332f5cf1f3b1e4f20612ecd37f08fa60382ecc5008af2d9a55216357d6927e706fd2ef60b772e7941631fdfe9b1d615e5264e99cffe59ad782
-
C:\Users\Admin\AppData\Roaming\WinDefrag\22171c0066fc01c0eca79128341c3e68_KaffaDaket119.exeFilesize
508KB
MD522161c0055fc01c0eca69127341c3e57
SHA1f9cba47d308c75bc02b4b15e757fd059e975de2a
SHA25612fb64c38d06802aa80fefb80c7f21431c5377d060201550853eb5d7a054fe51
SHA5124bd932ba64dc4a5126cea52311f019b204d07f5221d3eddefa3444b9b4d628c630076c25443833d63f598bb95250a3c698e0d75ecd58313b8e658881fda36f84
-
memory/1504-59-0x00000000034B0000-0x0000000003779000-memory.dmpFilesize
2.8MB
-
memory/1504-58-0x00000000033F0000-0x00000000034AE000-memory.dmpFilesize
760KB
-
memory/1504-45-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1504-44-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/3920-65-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/3920-50-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/3920-51-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/3920-57-0x00000182B5A20000-0x00000182B5A21000-memory.dmpFilesize
4KB
-
memory/4440-9-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-5-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-14-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-13-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-12-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-8-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-7-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-3-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-4-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-2-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-6-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-15-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-10-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-11-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB
-
memory/4440-19-0x0000000000433000-0x0000000000434000-memory.dmpFilesize
4KB
-
memory/4440-20-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/4440-17-0x0000000003370000-0x00000000033B0000-memory.dmpFilesize
256KB
-
memory/4440-16-0x0000000003360000-0x0000000003369000-memory.dmpFilesize
36KB