Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
-
Size
296KB
-
MD5
b00c7d30f2157cc3c3255a56b93f3912
-
SHA1
af6c486ca5028d6f9d20bca2e9064dfa771504d4
-
SHA256
8ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
-
SHA512
067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63
-
SSDEEP
6144:Yi3x4dZw9CYbZUtS7tpFX58BKuSNMMNYn9n:boItpFX5SQzA9n
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/852-18-0x0000000001C00000-0x0000000001C30000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2376 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 28 PID 2456 wrote to memory of 2580 2456 taskeng.exe 32 PID 2456 wrote to memory of 2580 2456 taskeng.exe 32 PID 2456 wrote to memory of 2580 2456 taskeng.exe 32 PID 2456 wrote to memory of 2580 2456 taskeng.exe 32 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2084
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {823F6D07-4FF9-4687-AC98-1C06F4CF7268} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5b00c7d30f2157cc3c3255a56b93f3912
SHA1af6c486ca5028d6f9d20bca2e9064dfa771504d4
SHA2568ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
SHA512067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63