Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    18/06/2024, 12:25 UTC

General

  • Target

    bbeb5feb9ec8793efaa4629f0d1068be_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    bbeb5feb9ec8793efaa4629f0d1068be

  • SHA1

    051993f259624bb37c1a8b831bafd355c96cd5c1

  • SHA256

    9ab3c84bab672f7255a290381d5553259f104983fcdaa7783f0bac6e0fec39e6

  • SHA512

    3385058238bd5cfa38ab2a583181846cdcd02484034f5c2c1e288ca7ea58d6f49cadb83a08631c083d0c5ca41a60c4133c5cbf341453e6443d4790963fb7abb0

  • SSDEEP

    6144:jaLhZbSA6MvATZz6fj9jS68nzLioU7mE+6qaOVah3sC:jaLh0nMVfxjS68nzLioU3+6qaOVGsC

Malware Config

Extracted

Family

trickbot

Version

1000285

Botnet

jim339

C2

193.111.63.208:443

68.3.14.71:443

198.255.175.117:449

5.196.131.249:443

181.113.17.230:449

205.157.150.98:443

82.146.61.93:443

207.140.14.141:443

42.115.91.177:443

54.39.167.242:443

71.94.101.25:443

68.45.243.125:449

92.223.105.252:443

182.50.64.148:449

187.190.249.230:443

140.190.54.187:449

82.222.40.119:449

24.119.69.70:449

188.68.208.242:443

103.110.91.118:449

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
    Name:pwgrab
ecc_pubkey.base64
1
RUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg=

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbeb5feb9ec8793efaa4629f0d1068be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bbeb5feb9ec8793efaa4629f0d1068be_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2420
    • C:\Windows\SysWOW64\cmd.exe
      /c sc delete WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\sc.exe
        sc delete WinDefend
        3⤵
        • Launches sc.exe
        PID:2388
    • C:\Windows\SysWOW64\cmd.exe
      /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Users\Admin\AppData\Roaming\WSOG\bbeb6feb9ec9893efaa4729f0d1079be_KaffaDaket119.exe
      C:\Users\Admin\AppData\Roaming\WSOG\bbeb6feb9ec9893efaa4729f0d1079be_KaffaDaket119.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        /c sc stop WinDefend
        3⤵
          PID:2428
          • C:\Windows\SysWOW64\sc.exe
            sc stop WinDefend
            4⤵
            • Launches sc.exe
            PID:768
        • C:\Windows\SysWOW64\cmd.exe
          /c sc delete WinDefend
          3⤵
            PID:2452
            • C:\Windows\SysWOW64\sc.exe
              sc delete WinDefend
              4⤵
              • Launches sc.exe
              PID:1452
          • C:\Windows\SysWOW64\cmd.exe
            /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
            3⤵
              PID:2308
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell Set-MpPreference -DisableRealtimeMonitoring $true
                4⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1492
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe
              3⤵
                PID:2828
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {CAAFDA26-E7D6-4A84-A813-BD2D29253D0A} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
              PID:1316
              • C:\Users\Admin\AppData\Roaming\WSOG\bbeb6feb9ec9893efaa4729f0d1079be_KaffaDaket119.exe
                C:\Users\Admin\AppData\Roaming\WSOG\bbeb6feb9ec9893efaa4729f0d1079be_KaffaDaket119.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1732
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe
                  3⤵
                    PID:1588

              Network

              • flag-us
                DNS
                api.ipify.org
                svchost.exe
                Remote address:
                8.8.8.8:53
                Request
                api.ipify.org
                IN A
                Response
                api.ipify.org
                IN A
                172.67.74.152
                api.ipify.org
                IN A
                104.26.12.205
                api.ipify.org
                IN A
                104.26.13.205
              • flag-us
                GET
                http://api.ipify.org/
                svchost.exe
                Remote address:
                172.67.74.152:80
                Request
                GET / HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                Host: api.ipify.org
                Response
                HTTP/1.1 200 OK
                Date: Tue, 18 Jun 2024 12:27:11 GMT
                Content-Type: text/plain
                Content-Length: 14
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 895b45a2ad11d17c-LHR
              • 172.67.74.152:80
                http://api.ipify.org/
                http
                svchost.exe
                376 B
                362 B
                4
                3

                HTTP Request

                GET http://api.ipify.org/

                HTTP Response

                200
              • 8.8.8.8:53
                api.ipify.org
                dns
                svchost.exe
                59 B
                107 B
                1
                1

                DNS Request

                api.ipify.org

                DNS Response

                172.67.74.152
                104.26.12.205
                104.26.13.205

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                Filesize

                7KB

                MD5

                156be381490259cea4ec82e791d3903d

                SHA1

                4e49b984962e210a21ed2bba815368653c74e64a

                SHA256

                410b5895be1b7543cf740cc9259d59e87894dbbaf2f6b3bd4d17d2631b9b83d3

                SHA512

                6497f2ec1f5eed03e843d9cebe275a313e0c84dda3087522488013be1127194272e05bae99ca1f7679f4f3e15474c0d14bc0b60581c87c1f97d2ba146292ccbb

              • \Users\Admin\AppData\Roaming\WSOG\bbeb6feb9ec9893efaa4729f0d1079be_KaffaDaket119.exe

                Filesize

                296KB

                MD5

                bbeb5feb9ec8793efaa4629f0d1068be

                SHA1

                051993f259624bb37c1a8b831bafd355c96cd5c1

                SHA256

                9ab3c84bab672f7255a290381d5553259f104983fcdaa7783f0bac6e0fec39e6

                SHA512

                3385058238bd5cfa38ab2a583181846cdcd02484034f5c2c1e288ca7ea58d6f49cadb83a08631c083d0c5ca41a60c4133c5cbf341453e6443d4790963fb7abb0

              • memory/1732-78-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-77-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-72-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-73-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-74-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-84-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-85-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-75-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-83-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-82-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-81-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-80-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-79-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1732-76-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/2384-50-0x0000000010000000-0x0000000010007000-memory.dmp

                Filesize

                28KB

              • memory/2384-49-0x0000000010000000-0x0000000010007000-memory.dmp

                Filesize

                28KB

              • memory/2384-48-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/2828-53-0x0000000140000000-0x0000000140039000-memory.dmp

                Filesize

                228KB

              • memory/2828-54-0x0000000140000000-0x0000000140039000-memory.dmp

                Filesize

                228KB

              • memory/3040-2-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-8-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-17-0x00000000004A0000-0x00000000004E0000-memory.dmp

                Filesize

                256KB

              • memory/3040-20-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/3040-4-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-5-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-3-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-7-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-13-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-9-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-10-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-11-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-12-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-19-0x0000000000405000-0x0000000000406000-memory.dmp

                Filesize

                4KB

              • memory/3040-14-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-15-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/3040-16-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.