Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exe
-
Size
572KB
-
MD5
d54d23f5fdbf03c102598d85742ac004
-
SHA1
c16a75322df05c9ee837b4443f6fb236523ef0f7
-
SHA256
e7638cdc2efcbfe15e47873199e69acb7557c6de78969dd6bab656896386e4a9
-
SHA512
8bc25eaacfc19bb83d164756978b20a9d7ed49a30457be208de5c292bf2fc894ef995031ece21e319c6746f6f91616f02b5e5c9ce898e57a1d95543f72d5fb79
-
SSDEEP
12288:IygFNIq7ECxVakKdlB2nToJ37RVtBq8H:IymhAIu2nQVVHx
Malware Config
Extracted
trickbot
1000252
ser0829us
195.54.163.150:443
168.167.51.10:443
178.116.83.49:443
176.114.66.20:449
162.212.112.175:449
158.58.131.54:443
104.254.10.200:449
118.200.151.113:443
41.211.9.234:449
178.78.202.189:443
109.173.104.236:449
212.225.214.249:449
81.17.86.112:443
41.189.173.18:443
46.149.182.112:449
197.232.243.36:449
198.164.250.111:449
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
176.10.170.65:443
62.141.94.107:443
96.43.40.221:443
197.232.50.85:443
195.123.209.174:443
80.240.31.132:443
94.103.80.15:443
92.38.135.59:443
185.252.144.16:443
185.174.172.197:443
195.54.163.29:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1336-2-0x0000000000400000-0x0000000000490000-memory.dmp trickbot_loader32 behavioral2/memory/2836-7-0x0000000000400000-0x0000000000490000-memory.dmp trickbot_loader32 behavioral2/memory/2836-13-0x0000000000400000-0x0000000000490000-memory.dmp trickbot_loader32 behavioral2/memory/1336-22-0x0000000000400000-0x0000000000490000-memory.dmp trickbot_loader32 behavioral2/memory/2836-23-0x0000000000400000-0x0000000000490000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exepid Process 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ident.me 34 checkip.amazonaws.com 4 ip.anysrc.net 8 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exed64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exedescription pid Process Token: SeTcbPrivilege 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exedescription pid Process procid_target PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86 PID 2836 wrote to memory of 3576 2836 d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54d23f5fdbf03c102598d85742ac004_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1336
-
C:\Users\Admin\AppData\Roaming\msccls\d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\msccls\d64d23f6fdbf03c102699d96842ac004_KaffaDaket119.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5d54d23f5fdbf03c102598d85742ac004
SHA1c16a75322df05c9ee837b4443f6fb236523ef0f7
SHA256e7638cdc2efcbfe15e47873199e69acb7557c6de78969dd6bab656896386e4a9
SHA5128bc25eaacfc19bb83d164756978b20a9d7ed49a30457be208de5c292bf2fc894ef995031ece21e319c6746f6f91616f02b5e5c9ce898e57a1d95543f72d5fb79