Analysis
-
max time kernel
123s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe
-
Size
320KB
-
MD5
ae85023a7b6da276428c6b02340fa3e3
-
SHA1
7da5787ba944ea5394c726f5ed57efd5fa079e35
-
SHA256
f86c292f843bb5759f9784c59b7ad987a53ffec1a23af124e6f2c36c88585a43
-
SHA512
06a6e19f7a0e8f00e0d7518d63b683fde1f1f03c56e629921a575169c43ca18cd90ef25b38dfe9bf8bc81a74e27bb97f398b2e6e6bdae7d9b4dc864c797e2517
-
SSDEEP
6144:Q+y7JBl5iOCaKAao6wd1yx/1qN2Rx7nI7GeDd3V+:Q+y7Dl8CKM6fx/AN2TzoGeD/+
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/388-18-0x0000000003250000-0x000000000327D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 5108 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 388 wrote to memory of 3344 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 83 PID 388 wrote to memory of 3344 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 83 PID 388 wrote to memory of 3344 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 83 PID 388 wrote to memory of 3344 388 ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe 83 PID 416 wrote to memory of 5108 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 92 PID 416 wrote to memory of 5108 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 92 PID 416 wrote to memory of 5108 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 92 PID 416 wrote to memory of 5108 416 ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae85023a7b6da276428c6b02340fa3e3_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3344
-
-
C:\Users\Admin\AppData\Roaming\netcloud\ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\netcloud\ae87023a9b8da298428c8b02340fa3e3_LaffaCameu118.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5ae85023a7b6da276428c6b02340fa3e3
SHA17da5787ba944ea5394c726f5ed57efd5fa079e35
SHA256f86c292f843bb5759f9784c59b7ad987a53ffec1a23af124e6f2c36c88585a43
SHA51206a6e19f7a0e8f00e0d7518d63b683fde1f1f03c56e629921a575169c43ca18cd90ef25b38dfe9bf8bc81a74e27bb97f398b2e6e6bdae7d9b4dc864c797e2517