Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe
-
Size
348KB
-
MD5
c376bf2085e4a128138f9670a00238df
-
SHA1
a07d8e9154ab987d6ec086fe1998e765acca2e08
-
SHA256
49b88c44acd0ac95bdf30f02c4692e4e46010363fb5609278837a998819c02f4
-
SHA512
2483fab364e3d0f0df484dba14f7af75c3b429de168a835a7f75d0c41482accac8dd014b5901960ab39b5890bd359ac6fd9ae2d2bc2855fe1923bce56451745d
-
SSDEEP
3072:iBVIprHpt3UJUx8J8BlA4wgfrgT5iH0OBZgD+GkG8sp40aHP00Wm6E6lW7mf2gq+:iBqZzx8GXfETq3Bxesci6OjgqlQex8
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3992-17-0x0000000000760000-0x0000000000789000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3992 c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1560 3992 c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe 84 PID 3992 wrote to memory of 1560 3992 c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe 84 PID 3992 wrote to memory of 1560 3992 c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe 84 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 1560 wrote to memory of 2608 1560 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 86 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 PID 3372 wrote to memory of 808 3372 c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c376bf2085e4a128138f9670a00238df_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Roaming\WNetval\c387bf2096e4a129139f9780a00239df_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2608
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\c387bf2096e4a129139f9780a00239df_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\c387bf2096e4a129139f9780a00239df_KaffaDaket119.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5c376bf2085e4a128138f9670a00238df
SHA1a07d8e9154ab987d6ec086fe1998e765acca2e08
SHA25649b88c44acd0ac95bdf30f02c4692e4e46010363fb5609278837a998819c02f4
SHA5122483fab364e3d0f0df484dba14f7af75c3b429de168a835a7f75d0c41482accac8dd014b5901960ab39b5890bd359ac6fd9ae2d2bc2855fe1923bce56451745d