Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe
-
Size
320KB
-
MD5
ae85023a7b6da276428c6b02340fa3e3
-
SHA1
7da5787ba944ea5394c726f5ed57efd5fa079e35
-
SHA256
f86c292f843bb5759f9784c59b7ad987a53ffec1a23af124e6f2c36c88585a43
-
SHA512
06a6e19f7a0e8f00e0d7518d63b683fde1f1f03c56e629921a575169c43ca18cd90ef25b38dfe9bf8bc81a74e27bb97f398b2e6e6bdae7d9b4dc864c797e2517
-
SSDEEP
6144:Q+y7JBl5iOCaKAao6wd1yx/1qN2Rx7nI7GeDd3V+:Q+y7Dl8CKM6fx/AN2TzoGeD/+
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/1808-18-0x0000000002500000-0x000000000252D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2544 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2604 1808 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 28 PID 1216 wrote to memory of 432 1216 taskeng.exe 32 PID 1216 wrote to memory of 432 1216 taskeng.exe 32 PID 1216 wrote to memory of 432 1216 taskeng.exe 32 PID 1216 wrote to memory of 432 1216 taskeng.exe 32 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 PID 432 wrote to memory of 2544 432 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2604
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5DA0B095-D760-474A-8E98-3E89BB5D4022} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\netcloud\ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\netcloud\ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5ae85023a7b6da276428c6b02340fa3e3
SHA17da5787ba944ea5394c726f5ed57efd5fa079e35
SHA256f86c292f843bb5759f9784c59b7ad987a53ffec1a23af124e6f2c36c88585a43
SHA51206a6e19f7a0e8f00e0d7518d63b683fde1f1f03c56e629921a575169c43ca18cd90ef25b38dfe9bf8bc81a74e27bb97f398b2e6e6bdae7d9b4dc864c797e2517