Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-07-2024 22:01

General

  • Target

    26991e003c7df1b7ed815750866abd09_JaffaCakes118.msi

  • Size

    900KB

  • MD5

    26991e003c7df1b7ed815750866abd09

  • SHA1

    029301174bd92c2dc2e5f2b4df426c33305ecdd7

  • SHA256

    e2db78db122785f0740bef4de8eef75a56370da463e1d9948aff66494ab7388e

  • SHA512

    9f22acffb159858365a9ee128f497b21e1cd7a6d631a4924dc5c19cf42ab63f7f0acb23e8219c89281fd6b0dd9872f3134540c9c7aacd06b2ffc98168fdbc485

  • SSDEEP

    6144:T/tWxOo6HFxhXTh/fotWZrgj1migvH74OULb:TFWxOo6lTNYWlkDo8X

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 14 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\26991e003c7df1b7ed815750866abd09_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2124
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADC024D02E43F8D9DB2981D731DB0E9F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\SysWOW64\expand.exe
        "C:\Windows\System32\expand.exe" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\files\backup.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\files\backup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
            PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\files"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2228
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A4" "00000000000005DC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {5351DEA8-5ECB-4CA7-8AEE-AA8AED358081} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
        PID:1324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\f76afd1.rbs

        Filesize

        1KB

        MD5

        082047ed4e3c68d2f436675bb2280974

        SHA1

        cee4d0f7371824cdab157ffc2ae3d10458f34751

        SHA256

        4a96df149d57a6a67752a5f1c89d9825605f24c9dc20a95b0a35aceb59a995c3

        SHA512

        2a8acfdc051eadeb9e46bc7920b1df88427f30a6ec14b33c1231c550d451dbf0bee944cf2d4bf4b3ba2462ebc13f79a9c87903028fa5e18d5b689455cc1c371d

      • C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\files.cab

        Filesize

        728KB

        MD5

        a8e7d2ea64b6a802129c898cac6b8cb8

        SHA1

        7d368cf9f0caa6c775d93d5b10458944b79ea03c

        SHA256

        519b3400f07273e4dbed56c805d32f99e6756a62a327a6708b9acae9fdbe7192

        SHA512

        60b1ced53b34d12ebe9be6df8fcfe3b47f3e872f46057e566c087c1b66dae6739cc499a8c6a4c860df19c8f809c0774fb1627a18b696a44d6bfaf9ccce37968b

      • C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\files\backup.exe

        Filesize

        728KB

        MD5

        44fe13c0c25a706c46247158fb4c932b

        SHA1

        46b183a1089a1e42cc510f662047c11610019656

        SHA256

        5868d46bd51c706f79a968ee4020810bffaed8a85a8c67a37d0c656a10a9eeba

        SHA512

        9e8e9b6296f7527002e10d9b3b26066731e69b2d0434af00ac46813728e038b02b223b092d2f77d43f7140d736b40d1aab0521b9177dc6541fff80888d33c619

      • C:\Users\Admin\AppData\Local\Temp\MW-ebb2de8c-10b8-419e-afa6-6d41c421fdb8\msiwrapper.ini

        Filesize

        458B

        MD5

        164f060737131cd38011c45da48f26fa

        SHA1

        8e7340e7bc26ad8f25152d90124d73cd34738bba

        SHA256

        97a0e5a3f5cd8cc4615c3d963274a6741040566726174928910d85bddfe332b1

        SHA512

        ab4dbdde16c37bec8b785b62fac7f55447b7c5c14bcc7d984d5b618d53cc0c7a09f98866efa1bed7b95ec99e3af9511dd3b3cfdb1121e05bf165d7eeb897dfb5

      • C:\Windows\Installer\MSIB0A9.tmp

        Filesize

        128KB

        MD5

        bd237aac254bd2285aa3b2d9023beedc

        SHA1

        3d2715c92a301dcad0d3d4683d559886202dec37

        SHA256

        b126b59c75f9e3ca19bd5f901c462325e954baf5719765bb0ea4a6e09b6b6b69

        SHA512

        72e912c23b6d3220b0b8d4ff262a28797ecc163449221ed5e5e047c3b0706f4b85211e74e61a3ac0ef6b1d5dda35eb341e2528a607ac3fca883c1d60967faa0a

      • memory/1532-50-0x00000000003D0000-0x00000000003FE000-memory.dmp

        Filesize

        184KB