Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
97891082565efc8eb700ef692c79f608_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
97891082565efc8eb700ef692c79f608_JaffaCakes118.exe
-
Size
588KB
-
MD5
97891082565efc8eb700ef692c79f608
-
SHA1
61d9858f39259478cb0c43b029286209b189ed04
-
SHA256
69bbd04122baa59b1918955d1b5c54eaeb6ec44aafb5c33a4b51437c57a8ea36
-
SHA512
6af1205efb19e3016123f67d0fea589107d11cc2fbe0652829283ca3f2e98c0e6780b2e58d3e2f124e5ac7b9ff6ff0c9d63cd4e4b68f02e1f54f9cd606480d59
-
SSDEEP
12288:QO3t2gOflh6mljwFKNu1XrgzzbvhsA9l9Lbz2:QO3t+flh6HKu1XrAZlLn
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2912-0-0x0000000000260000-0x000000000028D000-memory.dmp trickbot_loader32 behavioral1/memory/2912-2-0x0000000000260000-0x000000000028D000-memory.dmp trickbot_loader32 behavioral1/memory/2912-1-0x00000000001B0000-0x00000000001DD000-memory.dmp trickbot_loader32 behavioral1/memory/2912-3-0x0000000000260000-0x000000000028D000-memory.dmp trickbot_loader32 behavioral1/memory/2732-11-0x0000000000270000-0x000000000029D000-memory.dmp trickbot_loader32 behavioral1/memory/2732-12-0x0000000000270000-0x000000000029D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2752 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2928 2912 97891082565efc8eb700ef692c79f608_JaffaCakes118.exe 28 PID 2668 wrote to memory of 2732 2668 taskeng.exe 32 PID 2668 wrote to memory of 2732 2668 taskeng.exe 32 PID 2668 wrote to memory of 2732 2668 taskeng.exe 32 PID 2668 wrote to memory of 2732 2668 taskeng.exe 32 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 PID 2732 wrote to memory of 2752 2732 99891082787efc8eb900ef892c99f808_LaffaCameu118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\97891082565efc8eb700ef692c79f608_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\97891082565efc8eb700ef692c79f608_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2928
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3363394C-F250-4010-B245-2BA321D58C7B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\taskhealth\99891082787efc8eb900ef892c99f808_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\taskhealth\99891082787efc8eb900ef892c99f808_LaffaCameu118.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD597891082565efc8eb700ef692c79f608
SHA161d9858f39259478cb0c43b029286209b189ed04
SHA25669bbd04122baa59b1918955d1b5c54eaeb6ec44aafb5c33a4b51437c57a8ea36
SHA5126af1205efb19e3016123f67d0fea589107d11cc2fbe0652829283ca3f2e98c0e6780b2e58d3e2f124e5ac7b9ff6ff0c9d63cd4e4b68f02e1f54f9cd606480d59