Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe
-
Size
170KB
-
MD5
dc0bf2c3bd42044b7878e1c166276049
-
SHA1
0fb795778e8c3a3ee8d45e331418fec8c2a79b15
-
SHA256
b5de393db7bb75539807bc46a9a9e48ac5f98037309c0c01a7f0b26f6b546e7e
-
SHA512
7c9a28daf240778bea35e0a0c902bc65dbfd6f03562899d6afe7f60e22d77bf3677704d3a6bffd7ad58f9af39edcb94afc411ece1d348b36d3020a1865a6842f
-
SSDEEP
3072:SZdQdgNBseXB0825Biw2uuhB2RSCk8rFBItKZTHLoOZsUg3:f6HseXB0JBii02rFBItMHuUg
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3728-1-0x0000000002680000-0x0000000002689000-memory.dmp trickbot_loader32 behavioral2/memory/3728-2-0x0000000000400000-0x000000000043F000-memory.dmp trickbot_loader32 behavioral2/memory/3728-3-0x0000000002680000-0x0000000002689000-memory.dmp trickbot_loader32 behavioral2/memory/3728-15-0x0000000000400000-0x000000000043F000-memory.dmp trickbot_loader32 behavioral2/memory/3728-16-0x0000000002680000-0x0000000002689000-memory.dmp trickbot_loader32 -
Deletes itself 1 IoCs
pid Process 3832 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3832 powershell.exe 3832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3832 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3728 wrote to memory of 2360 3728 dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe 98 PID 3728 wrote to memory of 2360 3728 dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe 98 PID 3728 wrote to memory of 2360 3728 dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe 98 PID 2360 wrote to memory of 3832 2360 cmd.exe 100 PID 2360 wrote to memory of 3832 2360 cmd.exe 100 PID 2360 wrote to memory of 3832 2360 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exe/C PowerShell "Start-Sleep 10; Remove-Item C:\Users\Admin\AppData\Local\Temp\dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 10; Remove-Item C:\Users\Admin\AppData\Local\Temp\dc0bf2c3bd42044b7878e1c166276049_JaffaCakes118.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82