Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 04:49

General

  • Target

    b6d7de5ac47c20455438240fe1d2dda0_JaffaCakes118.exe

  • Size

    552KB

  • MD5

    b6d7de5ac47c20455438240fe1d2dda0

  • SHA1

    702df932d53385c0c961e37648a7fac9eb6c7a76

  • SHA256

    8f6027f7d19f89f40870ec8d56469fdb357c426374cc7d36fe34f956b1c90082

  • SHA512

    8df0ab6cf8081cc0e41abbadeb4ada5bd286408e928405634449f2a7fa524cfb6e5f60c8d29d461696236b142a6633f136ea7aed77a8410fa1211a5d1d356e25

  • SSDEEP

    6144:6zPHbUV4/5/XSEH0uzrBP4crsx0t0Ld2CyIgs0/f6e7mY+pwdmL:HE5/lUUF/A0OoCUv5xd

Malware Config

Extracted

Family

trickbot

Version

1000253

Botnet

ser0830us

C2

195.54.163.150:443

168.167.51.10:443

178.116.83.49:443

176.114.66.20:449

162.212.112.175:449

158.58.131.54:443

104.254.10.200:449

118.200.151.113:443

41.211.9.234:449

81.227.16.44:443

109.173.104.236:449

212.225.214.249:449

81.17.86.112:443

41.189.173.18:443

46.149.182.112:449

197.232.243.36:449

94.232.20.113:443

47.49.168.50:443

70.79.178.120:449

68.109.83.22:443

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 5 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6d7de5ac47c20455438240fe1d2dda0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b6d7de5ac47c20455438240fe1d2dda0_JaffaCakes118.exe"
    1⤵
      PID:752
    • C:\Users\Admin\AppData\Roaming\msccls\b7d8de6ac48c20466439240fe1d2dda0_KaffaDaket119.exe
      C:\Users\Admin\AppData\Roaming\msccls\b7d8de6ac48c20466439240fe1d2dda0_KaffaDaket119.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
          PID:3144

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\msccls\b7d8de6ac48c20466439240fe1d2dda0_KaffaDaket119.exe

        Filesize

        552KB

        MD5

        b6d7de5ac47c20455438240fe1d2dda0

        SHA1

        702df932d53385c0c961e37648a7fac9eb6c7a76

        SHA256

        8f6027f7d19f89f40870ec8d56469fdb357c426374cc7d36fe34f956b1c90082

        SHA512

        8df0ab6cf8081cc0e41abbadeb4ada5bd286408e928405634449f2a7fa524cfb6e5f60c8d29d461696236b142a6633f136ea7aed77a8410fa1211a5d1d356e25

      • memory/752-0-0x0000000000423000-0x0000000000424000-memory.dmp

        Filesize

        4KB

      • memory/752-2-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/752-1-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/752-13-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/3144-16-0x0000025371A20000-0x0000025371A21000-memory.dmp

        Filesize

        4KB

      • memory/3144-27-0x0000000140000000-0x0000000140036000-memory.dmp

        Filesize

        216KB

      • memory/3144-17-0x0000000140000000-0x0000000140036000-memory.dmp

        Filesize

        216KB

      • memory/3144-14-0x0000000140000000-0x0000000140036000-memory.dmp

        Filesize

        216KB

      • memory/4064-6-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4064-15-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4064-9-0x0000000010000000-0x0000000010007000-memory.dmp

        Filesize

        28KB

      • memory/4064-23-0x0000000001830000-0x00000000018EE000-memory.dmp

        Filesize

        760KB

      • memory/4064-24-0x00000000018F0000-0x0000000001BB9000-memory.dmp

        Filesize

        2.8MB

      • memory/4064-7-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4064-29-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB