Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe
-
Size
332KB
-
MD5
a469be02ff61bc09f6b6ddf0288912c7
-
SHA1
a759aec454148e287ed64e10b5d52a4c52029a16
-
SHA256
ee625df63c3b9d4f44d817d4de993f8baac0e6392326a2a0e41cc67da828720e
-
SHA512
1b2195df4ac6b2c0c3d3f0d71fe51a6bcb90721773f71f8fba46193ef70de9cc9141829824fb40fd40669cadf21fa9f885c8b4d585441af3f166682df31f1a0a
-
SSDEEP
6144:tWXQ+SLJ7v0cH9yRZiTAUbwp++0qZy1wSJR5rMpmez8iiXe:thNZ04oRpUbwtk1wSJR5rMh8C
Malware Config
Extracted
trickbot
1000214
ser0625
138.34.32.218:443
86.61.177.139:443
47.40.90.210:443
93.109.242.134:443
62.31.150.202:443
158.58.131.54:443
36.74.100.211:449
66.229.97.133:443
200.111.167.227:449
109.86.227.152:443
85.172.38.59:449
67.162.236.158:443
66.232.212.59:443
173.26.243.116:443
182.253.210.130:449
67.159.157.150:443
119.2.47.14:443
209.121.142.202:449
138.34.32.74:443
209.121.142.214:449
144.48.51.8:443
199.250.230.169:443
92.53.66.78:443
109.234.37.195:443
185.159.129.78:443
85.143.222.192:443
185.228.232.13:443
185.234.15.29:443
82.146.40.165:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4192-2-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4192-4-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4192-3-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4192-11-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4308-15-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4308-21-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4308-30-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\tarutils\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\tarutils\\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip.anysrc.net -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4900 set thread context of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 1940 set thread context of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4900 wrote to memory of 4192 4900 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 84 PID 4192 wrote to memory of 1940 4192 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 85 PID 4192 wrote to memory of 1940 4192 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 85 PID 4192 wrote to memory of 1940 4192 a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe 85 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 1940 wrote to memory of 4308 1940 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 86 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 PID 4308 wrote to memory of 3452 4308 a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a469be02ff61bc09f6b6ddf0288912c7_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Roaming\tarutils\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\tarutils\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\tarutils\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\tarutils\a479be02ff71bc09f7b7ddf0299912c8_KaffaDaket119.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Adds Run key to start application
PID:3452
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5a469be02ff61bc09f6b6ddf0288912c7
SHA1a759aec454148e287ed64e10b5d52a4c52029a16
SHA256ee625df63c3b9d4f44d817d4de993f8baac0e6392326a2a0e41cc67da828720e
SHA5121b2195df4ac6b2c0c3d3f0d71fe51a6bcb90721773f71f8fba46193ef70de9cc9141829824fb40fd40669cadf21fa9f885c8b4d585441af3f166682df31f1a0a