Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe
-
Size
431KB
-
MD5
88ba80c7e97f8d3f03bd4dfebfc09668
-
SHA1
db0096c7b90fc7c68a167dd32076c1ce82a146f7
-
SHA256
11bbe7a9082f72b7f78b99cba61025a78e138e8393735cc9d57a4e85add2a16a
-
SHA512
e6c5785fa8a41587c4e12c7ff4d997bed6c267d04385e9dc8aee72974e2805a0a3ffcd67e386fe875c8da1ec911bd4786fdae192c6771dc4d646fa3943c90175
-
SSDEEP
6144:BQ8EaK3HpbyqPWah0MlHlHt7pIrBEowSHYvhmYJ8a4Lil3U:BQ8ETlPWm0MlFHBiE/JkLiS
Malware Config
Extracted
trickbot
1000113
jim137
94.127.111.14:449
62.69.241.103:449
62.109.14.24:443
185.234.15.180:443
185.234.15.183:443
92.63.102.238:443
92.63.97.53:443
92.63.97.233:443
109.234.35.29:443
92.63.97.73:443
193.233.62.60:443
194.87.146.135:443
193.233.62.6:443
92.63.107.175:443
194.87.102.214:443
92.63.105.134:443
194.87.103.210:443
78.155.218.137:443
109.234.34.143:443
95.213.237.49:443
94.103.82.230:443
92.63.105.161:443
62.109.24.242:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 2788 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2568 2184 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2568 2184 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2568 2184 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2568 2184 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 28 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 PID 2568 wrote to memory of 2484 2568 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2484
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {22E67F44-A8B6-4BA8-BA76-06C2C2062F7D} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2716
-
C:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe2⤵
- Executes dropped EXE
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD588ba80c7e97f8d3f03bd4dfebfc09668
SHA1db0096c7b90fc7c68a167dd32076c1ce82a146f7
SHA25611bbe7a9082f72b7f78b99cba61025a78e138e8393735cc9d57a4e85add2a16a
SHA512e6c5785fa8a41587c4e12c7ff4d997bed6c267d04385e9dc8aee72974e2805a0a3ffcd67e386fe875c8da1ec911bd4786fdae192c6771dc4d646fa3943c90175