Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe
-
Size
832KB
-
MD5
00e39a7b19c14a3de002af3a292cb222
-
SHA1
c9f8b5eec84bc38d6907a5b112b324b6f19204c1
-
SHA256
a5a09247385ff78834fd34703aca46b222389e4d49b0758ba791269f21717914
-
SHA512
506d9485f21b50c8b212d1a339ea6bfb1b0a5062810e45a72db4889c4f2588f9bfe22c2329780bc37cdc9383b75f8370f76afd8db38c6ad3615d81a50d69cc68
-
SSDEEP
6144:0sPzkZx9XfzZbtr08QgkF72BPNC33Fk0oYQzYUqhLKByhgvb4Hf2L:tPzkZfxtQ8Ql75HJp+Yh+v4/8
Malware Config
Extracted
trickbot
2000025
tot44
134.119.186.200:443
45.14.226.115:443
85.204.116.134:443
45.89.127.240:443
195.123.241.195:443
188.34.142.248:443
185.234.72.84:443
108.170.20.72:443
94.158.245.54:443
134.119.186.201:443
45.83.129.224:443
85.93.159.98:449
92.242.214.203:449
202.21.103.194:449
169.239.45.42:449
45.234.248.66:449
103.91.244.102:449
118.67.216.238:449
117.212.193.62:449
201.184.190.59:449
103.29.185.138:449
79.122.166.236:449
37.143.150.186:449
179.191.108.58:449
85.159.214.61:443
149.56.80.31:443
-
autorunName:pwgrab
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4000 3092 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 388 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4528 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 81 PID 3092 wrote to memory of 4528 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 81 PID 3092 wrote to memory of 388 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 82 PID 3092 wrote to memory of 388 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 82 PID 3092 wrote to memory of 388 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 82 PID 3092 wrote to memory of 388 3092 00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00e39a7b19c14a3de002af3a292cb222_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:4528
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 6042⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3092 -ip 30921⤵PID:4204