Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
44669e0ff064dfc9e724391003dcde87_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
44669e0ff064dfc9e724391003dcde87_JaffaCakes118.dll
-
Size
353KB
-
MD5
44669e0ff064dfc9e724391003dcde87
-
SHA1
2a85323d7a18f375490b4316743792356917336c
-
SHA256
be974e1ac0c80224c35d49976e80b21dcbda291e6fc282b5aa26af01488e7fd7
-
SHA512
e67ae6c07e207928c45bac1bc05f42bf151ac19e0c3e3b73a0a9473549124a1dc8fd81f6ffc42001adc1579fc0250a24484374c721b0c47882938df21b992b7f
-
SSDEEP
6144:WFKu/DzWD+JOAQBHMa2Bgrc0P9eydIC5sCwllcQL727K7wbkQFV:WIckjAQGTCNP9vICCC2L729xV
Malware Config
Extracted
trickbot
100011
mon55
194.5.249.156:443
142.202.191.164:443
193.8.194.96:443
45.155.173.242:443
108.170.20.75:443
185.163.45.138:443
94.140.114.136:443
134.119.186.202:443
200.52.147.93:443
45.230.244.20:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
-
autorunName:pwgrab
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3068-0-0x0000000000130000-0x0000000000167000-memory.dmp templ_dll -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2884 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 2388 wrote to memory of 3068 2388 rundll32.exe rundll32.exe PID 3068 wrote to memory of 2868 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2868 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2868 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2868 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe PID 3068 wrote to memory of 2884 3068 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44669e0ff064dfc9e724391003dcde87_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44669e0ff064dfc9e724391003dcde87_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵PID:2868
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2884