Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 14:20

General

  • Target

    b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe

  • Size

    906KB

  • MD5

    b3f57312145e96cd6b3dfc4599e7ee9c

  • SHA1

    a67844a80ab94767a4cacf5caeaab391151921f7

  • SHA256

    20394dc816db696f7a9fe41ed1d6b581f91616e8de94b9810b580738fcc0baa7

  • SHA512

    d5398c0edecf810de93076fef3da592632efaf6ff381ddedfe7fde3a6e0bcb294e843b11ac5200994480f5a024a2b219a10e2930fcf85db0958c3c17dd8879b3

  • SSDEEP

    24576:X50tC/LBIgB04OCsc6bi2EjzIYMs25u1WnBGEQf3g9jT:X5KC/LBfOdcJd25UWwRP+H

Score
10/10

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 6 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\ProgramData\고다가녀리른모서처그니른있녀.exe
      "C:\ProgramData\고다가녀리른모서처그니른있녀.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2492
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {65E871CB-AD97-4A25-940A-72FCD988B798} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Users\Admin\AppData\Roaming\cashcore\고다가녀리른모서처그니른있녀.exe
        C:\Users\Admin\AppData\Roaming\cashcore\고다가녀리른모서처그니른있녀.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2636

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \ProgramData\고다가녀리른모서처그니른있녀.exe
      Filesize

      906KB

      MD5

      b3f57312145e96cd6b3dfc4599e7ee9c

      SHA1

      a67844a80ab94767a4cacf5caeaab391151921f7

      SHA256

      20394dc816db696f7a9fe41ed1d6b581f91616e8de94b9810b580738fcc0baa7

      SHA512

      d5398c0edecf810de93076fef3da592632efaf6ff381ddedfe7fde3a6e0bcb294e843b11ac5200994480f5a024a2b219a10e2930fcf85db0958c3c17dd8879b3

    • memory/1728-9-0x0000000000400000-0x00000000004EB000-memory.dmp
      Filesize

      940KB

    • memory/2144-15-0x0000000000400000-0x00000000004EB000-memory.dmp
      Filesize

      940KB

    • memory/2144-14-0x0000000000350000-0x000000000037E000-memory.dmp
      Filesize

      184KB

    • memory/2144-13-0x0000000000320000-0x000000000034C000-memory.dmp
      Filesize

      176KB

    • memory/2144-17-0x0000000010001000-0x0000000010005000-memory.dmp
      Filesize

      16KB

    • memory/2144-11-0x0000000000350000-0x000000000037E000-memory.dmp
      Filesize

      184KB

    • memory/2144-16-0x0000000000350000-0x000000000037E000-memory.dmp
      Filesize

      184KB

    • memory/2372-25-0x0000000000520000-0x000000000054E000-memory.dmp
      Filesize

      184KB

    • memory/2372-26-0x0000000000400000-0x00000000004EB000-memory.dmp
      Filesize

      940KB

    • memory/2372-27-0x0000000000520000-0x000000000054E000-memory.dmp
      Filesize

      184KB

    • memory/2492-18-0x0000000000060000-0x000000000007E000-memory.dmp
      Filesize

      120KB

    • memory/2492-20-0x0000000000060000-0x000000000007E000-memory.dmp
      Filesize

      120KB

    • memory/2636-28-0x00000000000E0000-0x00000000000FE000-memory.dmp
      Filesize

      120KB

    • memory/2636-29-0x00000000000E0000-0x00000000000FE000-memory.dmp
      Filesize

      120KB