Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
-
Size
361KB
-
MD5
74ba5e610af8da17018aeb37ed6fa834
-
SHA1
d3ca5eef27592370fa380729c83cbf7d49092244
-
SHA256
f1fca2ff7712a60158068b151b5ebf0c73826b50cb8be136fc17ba8c7c2d0107
-
SHA512
a66003a07e50f55a2d9d5eb0c5fdcc84e39362c3d1a97f8e7945b9b7995b0f109ffa1de75e242eec36bcd32824b9215040491b78374ac959e91fc6bde7d55d7e
-
SSDEEP
6144:6611x/ddyenQQU6wdLyTMnYtesyPLWJuUGq5BOf7aWpmJCp:6axvtn3LwdWCY3yO5jOzaWpmJ
Malware Config
Extracted
trickbot
1000265
ser0924
118.97.119.218:449
94.181.47.198:449
144.121.143.129:449
185.200.60.138:449
185.42.52.126:449
181.174.112.74:449
178.116.83.49:443
121.58.242.206:449
182.50.64.148:449
82.222.40.119:449
203.176.132.102:449
103.110.91.118:449
128.201.92.41:449
103.111.53.126:449
182.253.20.66:449
103.10.145.197:449
81.17.86.112:443
95.154.80.154:449
46.149.182.112:449
109.95.113.227:443
94.232.20.113:443
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
109.199.231.116:443
62.141.94.107:443
81.0.118.50:443
197.232.50.85:443
190.145.74.84:449
73.204.250.88:449
116.212.152.12:449
107.181.174.176:443
23.94.41.215:443
107.173.102.231:443
192.252.209.44:443
107.175.127.147:443
23.226.138.169:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/1636-1-0x0000000000540000-0x000000000057D000-memory.dmp trickbot_loader32 behavioral1/memory/2772-12-0x0000000000500000-0x000000000053D000-memory.dmp trickbot_loader32 behavioral1/memory/1636-33-0x0000000000540000-0x000000000057D000-memory.dmp trickbot_loader32 behavioral1/memory/1636-32-0x0000000000400000-0x0000000000460000-memory.dmp trickbot_loader32 behavioral1/memory/2772-35-0x0000000000500000-0x000000000053D000-memory.dmp trickbot_loader32 behavioral1/memory/2772-34-0x0000000000400000-0x0000000000460000-memory.dmp trickbot_loader32 behavioral1/memory/1820-50-0x0000000000400000-0x0000000000460000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 1820 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe -
Loads dropped DLL 2 IoCs
pid Process 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 wtfismyip.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2836 sc.exe 2556 sc.exe 2676 sc.exe 2588 sc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 2508 powershell.exe 2504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeTcbPrivilege 1820 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2092 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 28 PID 1636 wrote to memory of 2092 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 28 PID 1636 wrote to memory of 2092 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 28 PID 1636 wrote to memory of 2092 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 28 PID 1636 wrote to memory of 3056 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 29 PID 1636 wrote to memory of 3056 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 29 PID 1636 wrote to memory of 3056 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 29 PID 1636 wrote to memory of 3056 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 29 PID 1636 wrote to memory of 2604 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 30 PID 1636 wrote to memory of 2604 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 30 PID 1636 wrote to memory of 2604 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 30 PID 1636 wrote to memory of 2604 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 30 PID 1636 wrote to memory of 2772 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 34 PID 1636 wrote to memory of 2772 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 34 PID 1636 wrote to memory of 2772 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 34 PID 1636 wrote to memory of 2772 1636 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 34 PID 2772 wrote to memory of 2644 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 35 PID 2772 wrote to memory of 2644 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 35 PID 2772 wrote to memory of 2644 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 35 PID 2772 wrote to memory of 2644 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 35 PID 2772 wrote to memory of 2516 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 36 PID 2772 wrote to memory of 2516 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 36 PID 2772 wrote to memory of 2516 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 36 PID 2772 wrote to memory of 2516 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 36 PID 2772 wrote to memory of 2756 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 37 PID 2772 wrote to memory of 2756 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 37 PID 2772 wrote to memory of 2756 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 37 PID 2772 wrote to memory of 2756 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 37 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 PID 2772 wrote to memory of 2900 2772 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵PID:2092
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵PID:3056
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵PID:2644
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵PID:2516
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵PID:2756
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2900
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9A747F44-ED0F-4618-BEBD-8F354D5577B1} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1660
-
C:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-481678230-3773327859-3495911762-1000\0f5007522459c86e95ffcc62f32308f1_62d00eb3-39d9-4013-96e4-e92894ec756e
Filesize1KB
MD507532bb0d54f23d10ce8eafa0fe77375
SHA1e2c8c9caa5ebdf88aa0a3ad7969b6dfab266214f
SHA256f71cb9c16159ed557f347af0c53a30e993d82cb33977f952b3db8bbef35f2070
SHA512171b8a472efde1e842c13d2eb2cc72d5129fd1ed878b3186c8ac46488d8db9c9101d811dcbca33600676e625c1cba8164bbb63da061781350ecbee0dd13aa7e1
-
Filesize
361KB
MD574ba5e610af8da17018aeb37ed6fa834
SHA1d3ca5eef27592370fa380729c83cbf7d49092244
SHA256f1fca2ff7712a60158068b151b5ebf0c73826b50cb8be136fc17ba8c7c2d0107
SHA512a66003a07e50f55a2d9d5eb0c5fdcc84e39362c3d1a97f8e7945b9b7995b0f109ffa1de75e242eec36bcd32824b9215040491b78374ac959e91fc6bde7d55d7e