Analysis
-
max time kernel
141s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe
-
Size
296KB
-
MD5
b00c7d30f2157cc3c3255a56b93f3912
-
SHA1
af6c486ca5028d6f9d20bca2e9064dfa771504d4
-
SHA256
8ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
-
SHA512
067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63
-
SSDEEP
6144:Yi3x4dZw9CYbZUtS7tpFX58BKuSNMMNYn9n:boItpFX5SQzA9n
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3040-19-0x0000000002430000-0x0000000002460000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exepid process 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 4248 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exeb00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exepid process 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exeb00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exedescription pid process target process PID 3040 wrote to memory of 5412 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 3040 wrote to memory of 5412 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 3040 wrote to memory of 5412 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 3040 wrote to memory of 5412 3040 b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe svchost.exe PID 5804 wrote to memory of 4248 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 5804 wrote to memory of 4248 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 5804 wrote to memory of 4248 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe PID 5804 wrote to memory of 4248 5804 b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b00c7d30f2157cc3c3255a56b93f3912_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5536
-
C:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\cmdcache\b00c9d30f2179cc3c3277a78b93f3912_LaffaCameu118.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5b00c7d30f2157cc3c3255a56b93f3912
SHA1af6c486ca5028d6f9d20bca2e9064dfa771504d4
SHA2568ea3fd8a3c9a69e1bf8d07a456deceaddcb6dfc86f300ad00f5b1f83023b15bb
SHA512067c1bff8496ebb67c6fe8b99921632a36c1d14dc20e7ad2bc214ca66aa8898774d2c12c98f9158dbd92ae1f6d6f552a592e6dfa9fdbc7b475dc9acbf401cd63