Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
ac11833ad6b6b6b894c8afc1bcb68140_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
ac11833ad6b6b6b894c8afc1bcb68140_JaffaCakes118.dll
-
Size
353KB
-
MD5
ac11833ad6b6b6b894c8afc1bcb68140
-
SHA1
b321f66d1a06ef9883ca06d78e0f0b2dd1705c93
-
SHA256
58cdbb2c17ea6d6eb5a1c6952a8c6bf9e918c51bfc58a2639d2cf031b359da06
-
SHA512
3c8910e49cdc55277913d9b0184f17fba5fe812cc8f70bbf4ef51e0a46c209d2ea5c1406d2fe9445c9455cc095329a5825102fd86b37c979de617dcae63b2393
-
SSDEEP
6144:MvcW/D6HvoYb988GdTIKEXv/ZwHxIdfrYOxO6c8PCJV:M0E6Po498tTlEHZwRaYoO6uJV
Malware Config
Extracted
trickbot
100011
mon57
194.5.249.156:443
142.202.191.164:443
193.8.194.96:443
45.155.173.242:443
108.170.20.75:443
185.163.45.138:443
94.140.114.136:443
134.119.186.202:443
200.52.147.93:443
45.230.244.20:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
-
autorunName:pwgrab
Signatures
-
resource yara_rule behavioral2/memory/2484-0-0x0000000001210000-0x0000000001247000-memory.dmp templ_dll -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 wermgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2484 4988 rundll32.exe 91 PID 4988 wrote to memory of 2484 4988 rundll32.exe 91 PID 4988 wrote to memory of 2484 4988 rundll32.exe 91 PID 2484 wrote to memory of 2044 2484 rundll32.exe 104 PID 2484 wrote to memory of 2044 2484 rundll32.exe 104 PID 2484 wrote to memory of 2188 2484 rundll32.exe 105 PID 2484 wrote to memory of 2188 2484 rundll32.exe 105 PID 2484 wrote to memory of 2188 2484 rundll32.exe 105 PID 2484 wrote to memory of 2188 2484 rundll32.exe 105
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac11833ad6b6b6b894c8afc1bcb68140_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac11833ad6b6b6b894c8afc1bcb68140_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵PID:2044
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:81⤵PID:3712