Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe
-
Size
348KB
-
MD5
ced7ffbe44b657360ade1d0b52f2587e
-
SHA1
652caf6d1ac224983027f6176a90424547608345
-
SHA256
7aa0722dd865ebf63a7ff30db265862388a14cec3144dcd47643845a60a398ff
-
SHA512
1d5c2eeda8a8b54acc57b61412ff731788572fe3257421b977bf934573b8b34c0423f9a491a0e2cab4e79014c82ab35542ac8cedeb69051997453d29c35bf831
-
SSDEEP
6144:c5WV38sM2nwYuxTNCTFppNt0pzIZ5la22tVjSYevA8:2m33MiYSTFppNt0ptj/j/evA
Malware Config
Extracted
trickbot
1000192
tt0002
209.121.142.202:449
5.102.177.205:449
209.121.142.214:449
95.161.180.42:449
203.86.222.142:449
109.95.114.28:449
118.91.178.106:449
173.220.6.194:449
179.107.89.145:449
46.20.207.204:449
91.206.4.216:449
69.122.117.95:449
68.96.73.154:449
185.42.192.194:449
189.84.125.37:449
68.227.31.46:449
107.144.49.162:449
46.72.175.17:449
144.48.51.8:449
46.243.179.212:449
191.6.18.166:449
81.177.255.76:449
94.250.251.49:443
80.93.182.51:443
37.230.116.77:443
185.174.172.20:443
82.146.57.73:443
82.146.62.210:443
37.230.112.67:443
80.87.197.152:443
37.230.116.56:443
91.235.129.15:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\wsxmail\ = "0" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 1580 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2580 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 772 2348 ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe 31 PID 2348 wrote to memory of 772 2348 ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe 31 PID 2348 wrote to memory of 772 2348 ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe 31 PID 2348 wrote to memory of 772 2348 ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe 31 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 PID 772 wrote to memory of 2580 772 ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ced7ffbe44b657360ade1d0b52f2587e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\wsxmail\ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\wsxmail\ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Windows security bypass
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {79C42D19-AC4D-431C-A6CC-F2AF12FA5870} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2908
-
C:\Users\Admin\AppData\Roaming\wsxmail\ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\wsxmail\ced8ffbe44b768370ade1d0b62f2698e_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5ced7ffbe44b657360ade1d0b52f2587e
SHA1652caf6d1ac224983027f6176a90424547608345
SHA2567aa0722dd865ebf63a7ff30db265862388a14cec3144dcd47643845a60a398ff
SHA5121d5c2eeda8a8b54acc57b61412ff731788572fe3257421b977bf934573b8b34c0423f9a491a0e2cab4e79014c82ab35542ac8cedeb69051997453d29c35bf831