Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe
-
Size
361KB
-
MD5
74ba5e610af8da17018aeb37ed6fa834
-
SHA1
d3ca5eef27592370fa380729c83cbf7d49092244
-
SHA256
f1fca2ff7712a60158068b151b5ebf0c73826b50cb8be136fc17ba8c7c2d0107
-
SHA512
a66003a07e50f55a2d9d5eb0c5fdcc84e39362c3d1a97f8e7945b9b7995b0f109ffa1de75e242eec36bcd32824b9215040491b78374ac959e91fc6bde7d55d7e
-
SSDEEP
6144:6611x/ddyenQQU6wdLyTMnYtesyPLWJuUGq5BOf7aWpmJCp:6axvtn3LwdWCY3yO5jOzaWpmJ
Malware Config
Extracted
trickbot
1000265
ser0924
118.97.119.218:449
94.181.47.198:449
144.121.143.129:449
185.200.60.138:449
185.42.52.126:449
181.174.112.74:449
178.116.83.49:443
121.58.242.206:449
182.50.64.148:449
82.222.40.119:449
203.176.132.102:449
103.110.91.118:449
128.201.92.41:449
103.111.53.126:449
182.253.20.66:449
103.10.145.197:449
81.17.86.112:443
95.154.80.154:449
46.149.182.112:449
109.95.113.227:443
94.232.20.113:443
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
109.199.231.116:443
62.141.94.107:443
81.0.118.50:443
197.232.50.85:443
190.145.74.84:449
73.204.250.88:449
116.212.152.12:449
107.181.174.176:443
23.94.41.215:443
107.173.102.231:443
192.252.209.44:443
107.175.127.147:443
23.226.138.169:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3988-1-0x0000000000740000-0x000000000077D000-memory.dmp trickbot_loader32 behavioral2/memory/2316-13-0x0000000000730000-0x000000000076D000-memory.dmp trickbot_loader32 behavioral2/memory/3988-23-0x0000000000400000-0x0000000000460000-memory.dmp trickbot_loader32 behavioral2/memory/3988-24-0x0000000000740000-0x000000000077D000-memory.dmp trickbot_loader32 behavioral2/memory/2316-25-0x0000000000400000-0x0000000000460000-memory.dmp trickbot_loader32 behavioral2/memory/2316-28-0x0000000000730000-0x000000000076D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\AIMT\\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 icanhazip.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2316 3988 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 82 PID 3988 wrote to memory of 2316 3988 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 82 PID 3988 wrote to memory of 2316 3988 74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe 82 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 PID 2316 wrote to memory of 3424 2316 84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74ba5e610af8da17018aeb37ed6fa834JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\AIMT\84ba6e710af9da18019aeb38ed7fa934KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD574ba5e610af8da17018aeb37ed6fa834
SHA1d3ca5eef27592370fa380729c83cbf7d49092244
SHA256f1fca2ff7712a60158068b151b5ebf0c73826b50cb8be136fc17ba8c7c2d0107
SHA512a66003a07e50f55a2d9d5eb0c5fdcc84e39362c3d1a97f8e7945b9b7995b0f109ffa1de75e242eec36bcd32824b9215040491b78374ac959e91fc6bde7d55d7e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4124900551-4068476067-3491212533-1000\0f5007522459c86e95ffcc62f32308f1_310807ab-751f-4d81-ae09-b202eaf21e19
Filesize1KB
MD5dcac1aad221efc52ee313aa3241279a1
SHA12dced567584d12d8031448f7ae9e92af6b9e6edd
SHA25651b86d3a3c64f519182c440a50a32c2b3b2d8f7049a10022d55dd8b5ab772731
SHA5120f56a95ba1dd3abf1a09c6b054f61e55a4909ab4eb36574243e59550fce80994de10372f354dadc838c77600b9f9b04ff7aac498eaf1163f5be6d5b0fd498ed6