Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 16:17
Behavioral task
behavioral1
Sample
9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe
-
Size
174KB
-
MD5
9b4774b6033da19753bdde316eb6f67e
-
SHA1
6817de55865b4e198dac84c934b39c0ac78c3b90
-
SHA256
6cc3efcc4d64393074d60aea4c50585af789ff68b4c7b1181abf352b129a8840
-
SHA512
e514ccc208000f997fe16af47d662836b64330f7dc8ee109b7c06d99783401c692d95765ea0c3c79bc3109c4194b4c555b42f1a897e659f503b9c82da94563f1
-
SSDEEP
3072:V18iitLRzuVsXC6piXiTiXAkea4LrXaV/ZpRcF5apgVaA8U+LI/LctrXO7177dIC:wiMbpOzFeNWVDRcFbz8UOIKrXOt7dIk
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/1908-3-0x0000000000400000-0x000000000042E000-memory.dmp trickbot_loader32 behavioral1/memory/1908-0-0x0000000000400000-0x000000000042E000-memory.dmp trickbot_loader32 behavioral1/memory/2516-9-0x0000000000400000-0x000000000042E000-memory.dmp trickbot_loader32 behavioral1/memory/2516-12-0x0000000000400000-0x000000000042E000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1944 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1936 1908 9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe 28 PID 2408 wrote to memory of 2516 2408 taskeng.exe 32 PID 2408 wrote to memory of 2516 2408 taskeng.exe 32 PID 2408 wrote to memory of 2516 2408 taskeng.exe 32 PID 2408 wrote to memory of 2516 2408 taskeng.exe 32 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 PID 2516 wrote to memory of 1944 2516 9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9b4774b6033da19753bdde316eb6f67e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1936
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FE289E71-6608-485D-A4D2-084DB89125B0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\cashcore\9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cashcore\9b4994b8033da19973bdde318eb8f89e_LaffaCameu118.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD59b4774b6033da19753bdde316eb6f67e
SHA16817de55865b4e198dac84c934b39c0ac78c3b90
SHA2566cc3efcc4d64393074d60aea4c50585af789ff68b4c7b1181abf352b129a8840
SHA512e514ccc208000f997fe16af47d662836b64330f7dc8ee109b7c06d99783401c692d95765ea0c3c79bc3109c4194b4c555b42f1a897e659f503b9c82da94563f1