Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe
-
Size
484KB
-
MD5
4fe922a54bc265da98f4df8bfed40b3d
-
SHA1
4424909966ffe9bca6b4ebd1f668a3dfdd766915
-
SHA256
caaf1e55ed56dd398a7cc67bd4d680a20d5cd7831c30a21e8236456a0577f0ee
-
SHA512
507f0c0836c7f4253825f4f4cf4d43cb623097c3e8c2092c64deee845d0ac5b99c0f8b997f0c09bf24237235e93814e6b49a9984895cc2a1039ec32bff0ba36c
-
SSDEEP
6144:bUWMkODMOTK51JiXFBGBXrbD0bnoUJJOsrzWJu6UH1GXVVH9wOl6pIH3J:YbSAjzJsIzWJu6QcVauZ
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2888-19-0x0000000002450000-0x0000000002480000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exepid process 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 2264 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exepid process 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exedescription pid process target process PID 2888 wrote to memory of 2240 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe svchost.exe PID 2888 wrote to memory of 2240 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe svchost.exe PID 2888 wrote to memory of 2240 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe svchost.exe PID 2888 wrote to memory of 2240 2888 4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe svchost.exe PID 2872 wrote to memory of 2264 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe svchost.exe PID 2872 wrote to memory of 2264 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe svchost.exe PID 2872 wrote to memory of 2264 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe svchost.exe PID 2872 wrote to memory of 2264 2872 4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4fe922a54bc265da98f4df8bfed40b3d_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2240
-
-
C:\Users\Admin\AppData\Roaming\cmdcache\4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cmdcache\4fe922a74bc287da98f4df8bfed40b3d_LaffaCameu118.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD54fe922a54bc265da98f4df8bfed40b3d
SHA14424909966ffe9bca6b4ebd1f668a3dfdd766915
SHA256caaf1e55ed56dd398a7cc67bd4d680a20d5cd7831c30a21e8236456a0577f0ee
SHA512507f0c0836c7f4253825f4f4cf4d43cb623097c3e8c2092c64deee845d0ac5b99c0f8b997f0c09bf24237235e93814e6b49a9984895cc2a1039ec32bff0ba36c