Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe
-
Size
319KB
-
MD5
88f333320e4662ca05ee46b7291894bd
-
SHA1
d2d63ce35e5349aaae1c601fedc1fd0515f2a0f3
-
SHA256
4e69a7885e258bd850a4044aa3611565d2348046bed8b506769ab30e30aede77
-
SHA512
120d1203d8f6511512f84b0ee15c033ddf94f9a89bc4a627ce0718db40ba7a310697ed0d17ae6bed1df7ee48cf7078c93fb52282dda30547a53714d163167e6e
-
SSDEEP
6144:PhAnu2nueyBftJumjaT9lCMplFW2B2D4YVn7fcD7wSqEJtvi:Ph7Iu/bJuFTfCsnW4QcYS1JE
Malware Config
Extracted
trickbot
1000279
lib333
195.54.163.91:443
94.181.47.198:449
31.31.161.165:449
158.69.177.176:443
181.113.17.230:449
69.57.26.30:443
149.154.71.206:443
207.140.14.141:443
42.115.91.177:443
54.39.167.242:443
71.94.101.25:443
68.45.243.125:449
185.251.39.106:443
182.50.64.148:449
187.190.249.230:443
107.175.127.147:443
82.222.40.119:449
198.100.157.163:443
91.235.128.186:443
103.110.91.118:449
31.179.162.86:443
202.137.121.14:449
98.177.188.224:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
71.13.140.89:443
5.104.41.188:443
46.149.182.112:449
37.235.251.150:449
62.141.94.107:443
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
110.232.86.52:449
68.109.83.22:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2600-1-0x00000000026F0000-0x0000000002730000-memory.dmp trickbot_loader32 behavioral2/memory/4492-13-0x0000000002720000-0x0000000002760000-memory.dmp trickbot_loader32 behavioral2/memory/2600-23-0x0000000000400000-0x0000000000458000-memory.dmp trickbot_loader32 behavioral2/memory/2600-24-0x00000000026F0000-0x0000000002730000-memory.dmp trickbot_loader32 behavioral2/memory/4492-25-0x0000000000400000-0x0000000000458000-memory.dmp trickbot_loader32 behavioral2/memory/4492-28-0x0000000002720000-0x0000000002760000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\VsCard\99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\VsCard\\99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe" svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 api.ipify.org 29 api.ipify.org -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4492 2600 88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe 83 PID 2600 wrote to memory of 4492 2600 88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe 83 PID 2600 wrote to memory of 4492 2600 88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe 83 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 PID 4492 wrote to memory of 3488 4492 99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88f333320e4662ca05ee46b7291894bd_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\VsCard\99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\VsCard\99f333320e4772ca06ee47b8291994bd_KaffaDaket119.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1337824034-2731376981-3755436523-1000\0f5007522459c86e95ffcc62f32308f1_6833eb7b-8d4b-4cdd-9502-9bbf7fc1cf9f
Filesize1KB
MD5e48d16819993ec5a1dc190812519c824
SHA1647995a393c23b845ef0474eebe5da0acaf74c2d
SHA25652bb71961f16702c869b23e62cbf41117ec63dea59829764af8f56a77f8a7687
SHA512e028077e79c751ff1faece8d98b388931561de463617d3beaba529befb18fe3b8e30c81750df49d1ce08a8c444d7f2b09849349c0b82f83ca28b05c3ff2441bd
-
Filesize
319KB
MD588f333320e4662ca05ee46b7291894bd
SHA1d2d63ce35e5349aaae1c601fedc1fd0515f2a0f3
SHA2564e69a7885e258bd850a4044aa3611565d2348046bed8b506769ab30e30aede77
SHA512120d1203d8f6511512f84b0ee15c033ddf94f9a89bc4a627ce0718db40ba7a310697ed0d17ae6bed1df7ee48cf7078c93fb52282dda30547a53714d163167e6e