General
-
Target
88f333320e4662ca05ee46b7291894bd_JaffaCakes118
-
Size
319KB
-
Sample
240601-bmp2yace4t
-
MD5
88f333320e4662ca05ee46b7291894bd
-
SHA1
d2d63ce35e5349aaae1c601fedc1fd0515f2a0f3
-
SHA256
4e69a7885e258bd850a4044aa3611565d2348046bed8b506769ab30e30aede77
-
SHA512
120d1203d8f6511512f84b0ee15c033ddf94f9a89bc4a627ce0718db40ba7a310697ed0d17ae6bed1df7ee48cf7078c93fb52282dda30547a53714d163167e6e
-
SSDEEP
6144:PhAnu2nueyBftJumjaT9lCMplFW2B2D4YVn7fcD7wSqEJtvi:Ph7Iu/bJuFTfCsnW4QcYS1JE
Static task
static1
Behavioral task
behavioral1
Sample
88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
trickbot
1000279
lib333
195.54.163.91:443
94.181.47.198:449
31.31.161.165:449
158.69.177.176:443
181.113.17.230:449
69.57.26.30:443
149.154.71.206:443
207.140.14.141:443
42.115.91.177:443
54.39.167.242:443
71.94.101.25:443
68.45.243.125:449
185.251.39.106:443
182.50.64.148:449
187.190.249.230:443
107.175.127.147:443
82.222.40.119:449
198.100.157.163:443
91.235.128.186:443
103.110.91.118:449
31.179.162.86:443
202.137.121.14:449
98.177.188.224:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
71.13.140.89:443
5.104.41.188:443
46.149.182.112:449
37.235.251.150:449
62.141.94.107:443
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
110.232.86.52:449
68.109.83.22:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Targets
-
-
Target
88f333320e4662ca05ee46b7291894bd_JaffaCakes118
-
Size
319KB
-
MD5
88f333320e4662ca05ee46b7291894bd
-
SHA1
d2d63ce35e5349aaae1c601fedc1fd0515f2a0f3
-
SHA256
4e69a7885e258bd850a4044aa3611565d2348046bed8b506769ab30e30aede77
-
SHA512
120d1203d8f6511512f84b0ee15c033ddf94f9a89bc4a627ce0718db40ba7a310697ed0d17ae6bed1df7ee48cf7078c93fb52282dda30547a53714d163167e6e
-
SSDEEP
6144:PhAnu2nueyBftJumjaT9lCMplFW2B2D4YVn7fcD7wSqEJtvi:Ph7Iu/bJuFTfCsnW4QcYS1JE
-
Trickbot x86 loader
Detected Trickbot's x86 loader that unpacks the x86 payload.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1