Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe
-
Size
429KB
-
MD5
c7a0cae4eeaeca56e467505b1e8f7bfe
-
SHA1
5898c55e1a79d2e887b41a1d94591cab84fceb39
-
SHA256
ac8587f6955784f9a2d6cf70bcdce024122c8ec7b459b7e9c8da99dec5d125e0
-
SHA512
7e98f818f68c06d86bfe7623dc9b31ca1f25ef700d2bc9748df2c6db6cec077321478699d5e41fe3ebcfd7c67993c9270620c29008ec322a67c6565a38e8ac68
-
SSDEEP
6144:dfajn30w5Wet/sX6k1hsny0FW2Vd++gthfF9LX75Eau81zvxrpD:dfaj3JYMyonXdVo+yvu8h
Malware Config
Extracted
trickbot
1000309
lib362
185.251.39.103:443
24.247.181.155:449
174.105.235.178:449
213.183.63.16:443
74.132.133.246:449
174.105.233.82:449
71.14.129.8:449
198.46.131.164:443
74.132.135.120:449
198.46.160.217:443
71.94.101.25:443
206.130.141.255:449
192.3.52.107:443
74.140.160.33:449
65.31.241.133:449
140.190.54.187:449
24.247.181.226:449
108.160.196.130:449
23.94.187.116:443
103.110.91.118:449
85.143.220.14:443
75.108.123.165:449
72.189.124.41:449
74.134.5.113:449
105.27.171.234:449
182.253.20.66:449
172.222.97.179:449
72.241.62.188:449
198.46.198.241:443
199.227.126.250:449
97.87.172.0:449
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
64.128.175.37:449
24.227.222.4:449
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4532-4-0x00000000007D0000-0x0000000000810000-memory.dmp trickbot_loader32 behavioral2/memory/4532-9-0x0000000000400000-0x0000000000479000-memory.dmp trickbot_loader32 behavioral2/memory/4532-10-0x00000000007D0000-0x0000000000810000-memory.dmp trickbot_loader32 behavioral2/memory/4652-16-0x00000000006E0000-0x0000000000720000-memory.dmp trickbot_loader32 behavioral2/memory/4652-31-0x0000000000400000-0x0000000000479000-memory.dmp trickbot_loader32 behavioral2/memory/4652-34-0x00000000006E0000-0x0000000000720000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\NetSf\c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\NetSf\\c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ipecho.net -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4652 4532 c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe 95 PID 4532 wrote to memory of 4652 4532 c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe 95 PID 4532 wrote to memory of 4652 4532 c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe 95 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 PID 4652 wrote to memory of 3800 4652 c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7a0cae4eeaeca56e467505b1e8f7bfe_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Roaming\NetSf\c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\NetSf\c8a0cae4eeaeca67e478606b1e9f8bfe_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3800 -
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵PID:1380
-
-
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵PID:2264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD5e4bcd320585af9f77671cc6e91fe9de6
SHA115f12439eb3e133affb37b29e41e57d89fc90e06
SHA256a1e0f5a9cfc9615222f04e65455c7c4c1ba86710275afffd472428a293c31ec8
SHA51200497885531c0b84fe869828e5f2c0631f2f175f961c62175736487ae703252ba7393f882ffe99d8c4bcdb951172e35daa9ca41f45e64ce97fbae7721b25c112
-
Filesize
67B
MD558b2f90cc0182925ae0bab51700b14ab
SHA1d2975adeb8dc68f2f5e10edee524de78e79828db
SHA2568114822fe9a58e5ba08abb480dd595109c66a49d9afc404f85843915694c2964
SHA512de6154d3d44c7e332f5cf1f3b1e4f20612ecd37f08fa60382ecc5008af2d9a55216357d6927e706fd2ef60b772e7941631fdfe9b1d615e5264e99cffe59ad782
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\0f5007522459c86e95ffcc62f32308f1_1b74ca46-c49b-4c52-a57d-8cd1ff70c625
Filesize1KB
MD565d17db4d00f6d2b69d3b312ca663648
SHA1d7cf4c69361b4538a1e1db8e9fe52fccd3339d3e
SHA256a4450bf2768ee228b871907258f5c520811b7044e4c9780d25703e0d3a5c429b
SHA512bfd7f9b298229d676332e9b92150f9209eb8d1203f975577922ca4c21aa62b048ae8e491506a61cdf5d5abb26500eebce9dcc7c4f4851ef0a6b42bc32e8ab4f3
-
Filesize
429KB
MD5c7a0cae4eeaeca56e467505b1e8f7bfe
SHA15898c55e1a79d2e887b41a1d94591cab84fceb39
SHA256ac8587f6955784f9a2d6cf70bcdce024122c8ec7b459b7e9c8da99dec5d125e0
SHA5127e98f818f68c06d86bfe7623dc9b31ca1f25ef700d2bc9748df2c6db6cec077321478699d5e41fe3ebcfd7c67993c9270620c29008ec322a67c6565a38e8ac68