Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
-
Size
296KB
-
MD5
b00c7d30f2157cc3c3255a56b93f3912
-
SHA1
af6c486ca5028d6f9d20bca2e9064dfa771504d4
-
SHA256
8ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
-
SHA512
067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63
-
SSDEEP
6144:Yi3x4dZw9CYbZUtS7tpFX58BKuSNMMNYn9n:boItpFX5SQzA9n
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/852-18-0x0000000001C00000-0x0000000001C30000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exepid process 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 2376 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exeb00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exepid process 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exetaskeng.exeb00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exedescription pid process target process PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 852 wrote to memory of 2084 852 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 2456 wrote to memory of 2580 2456 taskeng.exe b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe PID 2456 wrote to memory of 2580 2456 taskeng.exe b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe PID 2456 wrote to memory of 2580 2456 taskeng.exe b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe PID 2456 wrote to memory of 2580 2456 taskeng.exe b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 2580 wrote to memory of 2376 2580 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {823F6D07-4FF9-4687-AC98-1C06F4CF7268} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5b00c7d30f2157cc3c3255a56b93f3912
SHA1af6c486ca5028d6f9d20bca2e9064dfa771504d4
SHA2568ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
SHA512067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63