Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
42c514def899ca171051b017eca2897c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
42c514def899ca171051b017eca2897c_JaffaCakes118.exe
-
Size
484KB
-
MD5
42c514def899ca171051b017eca2897c
-
SHA1
2425d3919768c3550c9ca6b9515b2b70a975cf28
-
SHA256
7be93cb5ad63034e82581b0a685a5c140c4cf349839edb1f04edd69a420dfb0f
-
SHA512
0607bdb3da56ed692f3afc78dd0cd37ee11ec45e87a1ff00930cd76eee0913c34b787d6443f6ff1516f0b75ac72cae969a7c5e4f51ceb69ec5f92939bf611bbc
-
SSDEEP
6144:bjWMkODMOTK51JiXFBGBXrbD0bnoUJJOsrzWJu6UH1GXVVH9wOl6pIH3J:XbSAjzJsIzWJu6QcVauZ
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1560-18-0x0000000002BE0000-0x0000000002C10000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
42c714def899ca191071b019eca2899c_LaffaCameu118.exepid process 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1360 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
42c514def899ca171051b017eca2897c_JaffaCakes118.exe42c714def899ca191071b019eca2899c_LaffaCameu118.exepid process 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
42c514def899ca171051b017eca2897c_JaffaCakes118.exe42c714def899ca191071b019eca2899c_LaffaCameu118.exedescription pid process target process PID 1560 wrote to memory of 4452 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe svchost.exe PID 1560 wrote to memory of 4452 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe svchost.exe PID 1560 wrote to memory of 4452 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe svchost.exe PID 1560 wrote to memory of 4452 1560 42c514def899ca171051b017eca2897c_JaffaCakes118.exe svchost.exe PID 3784 wrote to memory of 1360 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe svchost.exe PID 3784 wrote to memory of 1360 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe svchost.exe PID 3784 wrote to memory of 1360 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe svchost.exe PID 3784 wrote to memory of 1360 3784 42c714def899ca191071b019eca2899c_LaffaCameu118.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c514def899ca171051b017eca2897c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42c514def899ca171051b017eca2897c_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4452
-
-
C:\Users\Admin\AppData\Roaming\cmdcache\42c714def899ca191071b019eca2899c_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cmdcache\42c714def899ca191071b019eca2899c_LaffaCameu118.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD542c514def899ca171051b017eca2897c
SHA12425d3919768c3550c9ca6b9515b2b70a975cf28
SHA2567be93cb5ad63034e82581b0a685a5c140c4cf349839edb1f04edd69a420dfb0f
SHA5120607bdb3da56ed692f3afc78dd0cd37ee11ec45e87a1ff00930cd76eee0913c34b787d6443f6ff1516f0b75ac72cae969a7c5e4f51ceb69ec5f92939bf611bbc