Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe
-
Size
479KB
-
MD5
d74f6f38f03acb6713cfe0bc28a02673
-
SHA1
2d2482fa5beb63724d86e2c45fb74664c51d910a
-
SHA256
4e9a82dfa6162528e576b36551313540f52394cc82f276684f85cf34182aee2b
-
SHA512
21080d91fd1761150fcb2fd190e33203965e79a67937674163a0de7d4922d6f8e5e30c525cce79f4146afd871702cc96498754eec2a1b298bf6907a1de03c732
-
SSDEEP
6144:ZAFhfEh0YAppPTxSKZNceVL5t0e6drt1mCkFRvFFQhlqKEp/wCqY:ZcEWYAbTxD0eDtHCJ1mCkFRvghusY
Malware Config
Extracted
trickbot
1000263
jim315
118.97.119.218:449
94.181.47.198:449
144.121.143.129:449
185.200.60.138:449
185.42.52.126:449
181.174.112.74:449
178.116.83.49:443
121.58.242.206:449
182.50.64.148:449
82.222.40.119:449
97.78.222.18:449
67.79.15.106:449
168.167.87.79:443
103.111.53.126:449
182.253.20.66:449
192.188.120.164:443
81.17.86.112:443
95.154.80.154:449
46.149.182.112:449
69.9.232.167:443
94.232.20.113:443
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
109.199.231.116:443
62.141.94.107:443
96.43.40.221:443
197.232.50.85:443
190.145.74.84:449
185.222.202.127:443
116.212.152.12:449
107.181.174.176:443
23.94.41.215:443
107.173.102.231:443
192.252.209.44:443
107.175.127.147:443
23.226.138.169:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2676-0-0x0000000000D40000-0x0000000000D7D000-memory.dmp trickbot_loader32 behavioral2/memory/744-5-0x0000000000800000-0x000000000083D000-memory.dmp trickbot_loader32 behavioral2/memory/2676-21-0x0000000000D40000-0x0000000000D7D000-memory.dmp trickbot_loader32 behavioral2/memory/744-25-0x0000000000800000-0x000000000083D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exepid Process 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\mssert\d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe = "C:\\Users\\Admin\\AppData\\Roaming\\mssert\\d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 wtfismyip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exed84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exed84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exedescription pid Process procid_target PID 2676 wrote to memory of 744 2676 d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe 84 PID 2676 wrote to memory of 744 2676 d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe 84 PID 2676 wrote to memory of 744 2676 d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe 84 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 PID 744 wrote to memory of 5028 744 d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d74f6f38f03acb6713cfe0bc28a02673_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\mssert\d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\mssert\d84f7f39f03acb7813cfe0bc29a02783_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5d74f6f38f03acb6713cfe0bc28a02673
SHA12d2482fa5beb63724d86e2c45fb74664c51d910a
SHA2564e9a82dfa6162528e576b36551313540f52394cc82f276684f85cf34182aee2b
SHA51221080d91fd1761150fcb2fd190e33203965e79a67937674163a0de7d4922d6f8e5e30c525cce79f4146afd871702cc96498754eec2a1b298bf6907a1de03c732