Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe
-
Size
273KB
-
MD5
60be89cfcec7b0f485bba11b53df8d4c
-
SHA1
dbbd2a2dc60a55441e9c08cd78e710029da3eac7
-
SHA256
1f80cb0b28f49ef4ae993b4e762dc99481980259c69b533a85a7756af215fa3f
-
SHA512
61d817555c032af01881022e0f6a87f6548ec2771689c980b810e7fae184ce0efe444d6c537de11e3735f6a810252afae434d99387c84a7d03373abb668249dc
-
SSDEEP
6144:qAe7p8fXlw+Ne92McccntNLpdy70/TT3GkO:qAe98fV1Ne92v5t/Oh
Malware Config
Signatures
-
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2904-1-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/2904-3-0x0000000000401000-0x0000000000424000-memory.dmp trickbot_loader32 behavioral2/memory/3240-16-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/2904-8-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/2904-9-0x0000000000401000-0x0000000000424000-memory.dmp trickbot_loader32 behavioral2/memory/3240-23-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/2804-29-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/2804-40-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 behavioral2/memory/3684-59-0x0000000000400000-0x000000000044A000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 2804 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 3684 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 ipinfo.io -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2804 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe Token: SeTcbPrivilege 3684 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3240 2904 60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe 92 PID 2904 wrote to memory of 3240 2904 60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe 92 PID 2904 wrote to memory of 3240 2904 60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe 92 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 PID 3240 wrote to memory of 404 3240 70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60be89cfcec7b0f485bba11b53df8d4c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:404
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4040,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:4032
-
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:316
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\70be99cfcec8b0f496bba11b63df9d4c_KaffaDaket119.exe
Filesize273KB
MD560be89cfcec7b0f485bba11b53df8d4c
SHA1dbbd2a2dc60a55441e9c08cd78e710029da3eac7
SHA2561f80cb0b28f49ef4ae993b4e762dc99481980259c69b533a85a7756af215fa3f
SHA51261d817555c032af01881022e0f6a87f6548ec2771689c980b810e7fae184ce0efe444d6c537de11e3735f6a810252afae434d99387c84a7d03373abb668249dc