Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 14:20

General

  • Target

    b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe

  • Size

    906KB

  • MD5

    b3f57312145e96cd6b3dfc4599e7ee9c

  • SHA1

    a67844a80ab94767a4cacf5caeaab391151921f7

  • SHA256

    20394dc816db696f7a9fe41ed1d6b581f91616e8de94b9810b580738fcc0baa7

  • SHA512

    d5398c0edecf810de93076fef3da592632efaf6ff381ddedfe7fde3a6e0bcb294e843b11ac5200994480f5a024a2b219a10e2930fcf85db0958c3c17dd8879b3

  • SSDEEP

    24576:X50tC/LBIgB04OCsc6bi2EjzIYMs25u1WnBGEQf3g9jT:X5KC/LBfOdcJd25UWwRP+H

Score
10/10

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 6 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3f57312145e96cd6b3dfc4599e7ee9c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\ProgramData\고다가녀리른모서처그니른있녀.exe
      "C:\ProgramData\고다가녀리른모서처그니른있녀.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:4356
    • C:\Users\Admin\AppData\Roaming\cashcore\고다가녀리른모서처그니른있녀.exe
      C:\Users\Admin\AppData\Roaming\cashcore\고다가녀리른모서처그니른있녀.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\고다가녀리른모서처그니른있녀.exe

      Filesize

      906KB

      MD5

      b3f57312145e96cd6b3dfc4599e7ee9c

      SHA1

      a67844a80ab94767a4cacf5caeaab391151921f7

      SHA256

      20394dc816db696f7a9fe41ed1d6b581f91616e8de94b9810b580738fcc0baa7

      SHA512

      d5398c0edecf810de93076fef3da592632efaf6ff381ddedfe7fde3a6e0bcb294e843b11ac5200994480f5a024a2b219a10e2930fcf85db0958c3c17dd8879b3

    • memory/2904-29-0x000001B778700000-0x000001B77871E000-memory.dmp

      Filesize

      120KB

    • memory/2904-27-0x000001B778700000-0x000001B77871E000-memory.dmp

      Filesize

      120KB

    • memory/3428-8-0x0000000000400000-0x00000000004EB000-memory.dmp

      Filesize

      940KB

    • memory/3496-26-0x0000000000830000-0x000000000085E000-memory.dmp

      Filesize

      184KB

    • memory/3496-25-0x0000000000400000-0x00000000004EB000-memory.dmp

      Filesize

      940KB

    • memory/3496-24-0x0000000000830000-0x000000000085E000-memory.dmp

      Filesize

      184KB

    • memory/4356-18-0x000002375A340000-0x000002375A35E000-memory.dmp

      Filesize

      120KB

    • memory/4356-16-0x000002375A340000-0x000002375A35E000-memory.dmp

      Filesize

      120KB

    • memory/4472-12-0x00000000007C0000-0x00000000007EE000-memory.dmp

      Filesize

      184KB

    • memory/4472-13-0x0000000000400000-0x00000000004EB000-memory.dmp

      Filesize

      940KB

    • memory/4472-15-0x0000000010001000-0x0000000010005000-memory.dmp

      Filesize

      16KB

    • memory/4472-14-0x00000000007C0000-0x00000000007EE000-memory.dmp

      Filesize

      184KB

    • memory/4472-11-0x0000000000790000-0x00000000007BC000-memory.dmp

      Filesize

      176KB

    • memory/4472-9-0x00000000007C0000-0x00000000007EE000-memory.dmp

      Filesize

      184KB