Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe
-
Size
396KB
-
MD5
49ab609e481a257f91b2ec5890f1bdfe
-
SHA1
e63bc6ee03c71cf4fa059c5e493ba1146c642e39
-
SHA256
a3be83ebebc99e2a678844667c4ff6a54808aa799d98aaf9be1022af4ac80e16
-
SHA512
e702298b0cc5cf3a6139cd3df1ec61c46f662e32b998fce5de364de83a64848b4725b33e67edbabfd04b81e981d888de567b8d8eb18c758da62c6406a2b35e6d
-
SSDEEP
6144:FNXE/CMgQEN+Vd9z3iODdRc408i1gs9BL/eSTHkC73alPBlFdQ49qE:FyJEQVDDRdRDi1v4STHk37W49f
Malware Config
Extracted
trickbot
1000268
tot319
23.92.93.229:443
94.181.47.198:449
75.103.4.186:443
23.94.41.215:443
181.113.17.230:449
212.23.70.149:443
23.94.233.142:443
170.81.32.66:449
42.115.91.177:443
107.173.102.231:443
121.58.242.206:449
167.114.13.91:443
192.252.209.44:443
182.50.64.148:449
187.190.249.230:443
107.175.127.147:443
82.222.40.119:449
198.100.157.163:443
23.226.138.169:443
103.110.91.118:449
173.239.128.74:443
128.201.92.41:449
70.48.101.54:443
103.111.53.126:449
185.66.227.183:443
182.253.20.66:449
71.13.140.89:443
103.10.145.197:449
178.116.83.49:443
46.149.182.112:449
81.17.86.112:443
62.141.94.107:443
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
116.212.152.12:449
68.109.83.22:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2872-19-0x00000000003B0000-0x00000000003ED000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 2888 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2700 sc.exe 2576 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe Token: SeTcbPrivilege 2888 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 2888 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2884 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2884 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2884 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 28 PID 2872 wrote to memory of 2884 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 28 PID 2872 wrote to memory of 1276 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 29 PID 2872 wrote to memory of 1276 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 29 PID 2872 wrote to memory of 1276 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 29 PID 2872 wrote to memory of 1276 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 29 PID 2872 wrote to memory of 2096 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2096 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2096 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2096 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2640 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 34 PID 2872 wrote to memory of 2640 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 34 PID 2872 wrote to memory of 2640 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 34 PID 2872 wrote to memory of 2640 2872 49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe 34 PID 1276 wrote to memory of 2576 1276 cmd.exe 35 PID 1276 wrote to memory of 2576 1276 cmd.exe 35 PID 1276 wrote to memory of 2576 1276 cmd.exe 35 PID 1276 wrote to memory of 2576 1276 cmd.exe 35 PID 2096 wrote to memory of 2544 2096 cmd.exe 36 PID 2096 wrote to memory of 2544 2096 cmd.exe 36 PID 2096 wrote to memory of 2544 2096 cmd.exe 36 PID 2096 wrote to memory of 2544 2096 cmd.exe 36 PID 2884 wrote to memory of 2700 2884 cmd.exe 37 PID 2884 wrote to memory of 2700 2884 cmd.exe 37 PID 2884 wrote to memory of 2700 2884 cmd.exe 37 PID 2884 wrote to memory of 2700 2884 cmd.exe 37 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 PID 2640 wrote to memory of 2648 2640 49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49ab609e481a257f91b2ec5890f1bdfe_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Users\Admin\AppData\Roaming\AIMT\49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\AIMT\49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2648
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D38C6D4A-022A-4AF3-980A-9F1E578D1C82} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1256
-
C:\Users\Admin\AppData\Roaming\AIMT\49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\AIMT\49ab709e491a268f91b2ec6990f1bdfe_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD549ab609e481a257f91b2ec5890f1bdfe
SHA1e63bc6ee03c71cf4fa059c5e493ba1146c642e39
SHA256a3be83ebebc99e2a678844667c4ff6a54808aa799d98aaf9be1022af4ac80e16
SHA512e702298b0cc5cf3a6139cd3df1ec61c46f662e32b998fce5de364de83a64848b4725b33e67edbabfd04b81e981d888de567b8d8eb18c758da62c6406a2b35e6d