Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe
-
Size
225KB
-
MD5
72b5f100dfd944d7ccc2f3be2f8ad1d2
-
SHA1
c09baf56de578ed27f991913fd48faddb84e681e
-
SHA256
75a3d4745aef792b27072ba481d9603d6aedc02de66a81414ed3cab6523cd896
-
SHA512
93ae16a696200444c922910b093196e06f61a5673de4ed63a3a1d5ee1e2fcf7229430f9d146a6b9f8f23178716e0e5d7fe6a24f8534cc3751af64e4d01272d15
-
SSDEEP
6144:wrtuSXcB01RwHnz/Ze2WnnnnhjigW9cFUJI5lwUCcrXl0W9MgkztHl:wrtnXUu6nDZe2Wnnnnhjig1XfXl0W9MH
Malware Config
Extracted
trickbot
1000088
kas87
187.188.162.150:449
83.0.245.234:449
149.154.68.252:443
194.87.111.10:443
194.87.93.0:443
185.228.232.173:443
194.87.111.131:443
185.228.232.175:443
62.109.11.80:443
91.211.246.180:443
91.211.246.195:443
91.211.246.47:443
185.228.232.209:443
78.24.218.150:443
92.63.97.68:443
194.87.234.31:443
82.146.61.187:443
80.87.199.210:443
82.146.59.149:443
188.120.247.223:443
94.250.250.112:443
149.154.71.95:443
37.230.112.76:443
94.250.250.114:443
185.158.114.201:443
185.158.152.13:443
91.211.246.244:443
185.125.46.29:443
185.80.129.124:443
195.133.145.118:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exepid process 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe 2948 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe 4260 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 49 ip.anysrc.net -
Modifies data under HKEY_USERS 40 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exedescription pid process target process PID 2524 wrote to memory of 4192 2524 72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe PID 2524 wrote to memory of 4192 2524 72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe PID 2524 wrote to memory of 4192 2524 72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe PID 4192 wrote to memory of 544 4192 73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72b5f100dfd944d7ccc2f3be2f8ad1d2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SYSTEM32\svchost.exesvchost.exe3⤵PID:544
-
C:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe1⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Modifies data under HKEY_USERS
PID:4936
-
C:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\services\73b6g200ege955e7ddd3g4bf3g8ae2e3_JaggaCalfs228.exe1⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD572b5f100dfd944d7ccc2f3be2f8ad1d2
SHA1c09baf56de578ed27f991913fd48faddb84e681e
SHA25675a3d4745aef792b27072ba481d9603d6aedc02de66a81414ed3cab6523cd896
SHA51293ae16a696200444c922910b093196e06f61a5673de4ed63a3a1d5ee1e2fcf7229430f9d146a6b9f8f23178716e0e5d7fe6a24f8534cc3751af64e4d01272d15