Analysis
-
max time kernel
148s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe
-
Size
431KB
-
MD5
88ba80c7e97f8d3f03bd4dfebfc09668
-
SHA1
db0096c7b90fc7c68a167dd32076c1ce82a146f7
-
SHA256
11bbe7a9082f72b7f78b99cba61025a78e138e8393735cc9d57a4e85add2a16a
-
SHA512
e6c5785fa8a41587c4e12c7ff4d997bed6c267d04385e9dc8aee72974e2805a0a3ffcd67e386fe875c8da1ec911bd4786fdae192c6771dc4d646fa3943c90175
-
SSDEEP
6144:BQ8EaK3HpbyqPWah0MlHlHt7pIrBEowSHYvhmYJ8a4Lil3U:BQ8ETlPWm0MlFHBiE/JkLiS
Malware Config
Extracted
trickbot
1000113
jim137
94.127.111.14:449
62.69.241.103:449
62.109.14.24:443
185.234.15.180:443
185.234.15.183:443
92.63.102.238:443
92.63.97.53:443
92.63.97.233:443
109.234.35.29:443
92.63.97.73:443
193.233.62.60:443
194.87.146.135:443
193.233.62.6:443
92.63.107.175:443
194.87.102.214:443
92.63.105.134:443
194.87.103.210:443
78.155.218.137:443
109.234.34.143:443
95.213.237.49:443
94.103.82.230:443
92.63.105.161:443
62.109.24.242:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 1524 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3884 wrote to memory of 5016 3884 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 92 PID 3884 wrote to memory of 5016 3884 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 92 PID 3884 wrote to memory of 5016 3884 88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe 92 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 PID 5016 wrote to memory of 5172 5016 88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88ba80c7e97f8d3f03bd4dfebfc09668_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5172
-
-
-
C:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exeC:\Users\Admin\AppData\Roaming\localservice\88ba80c7f97g8e4g04be5egfbgc09668_JaggaCalfs228.exe1⤵
- Executes dropped EXE
PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD588ba80c7e97f8d3f03bd4dfebfc09668
SHA1db0096c7b90fc7c68a167dd32076c1ce82a146f7
SHA25611bbe7a9082f72b7f78b99cba61025a78e138e8393735cc9d57a4e85add2a16a
SHA512e6c5785fa8a41587c4e12c7ff4d997bed6c267d04385e9dc8aee72974e2805a0a3ffcd67e386fe875c8da1ec911bd4786fdae192c6771dc4d646fa3943c90175