Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
eb09f23e53fc62dbcc8b7d684eb3195d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eb09f23e53fc62dbcc8b7d684eb3195d_JaffaCakes118.exe
-
Size
629KB
-
MD5
eb09f23e53fc62dbcc8b7d684eb3195d
-
SHA1
3fa8ed210c78f360c29e3eae927d75653c2cee0c
-
SHA256
d7ab4c53b42ae612ababcc0db22b292aa6bb3c97291b9df2431104a7e2c6cac6
-
SHA512
e3144cf7f204631c4f51e9a5ee7d30c541b4ddf322fa1c94216c6a7208f419cc298c149ac0ab2bb45e2d499688f12434041a41250944b73be000b797e6d33282
-
SSDEEP
12288:CcWkdhznAyqlZIZnIWOOHFXHllJ0FIKUZKsk4CHkFuapmGdT9l1:CcbHznAyqlZIZnIPOFYIJZKL4CHKn
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2400-0-0x0000000000350000-0x0000000000359000-memory.dmp trickbot_loader32 behavioral1/memory/2400-3-0x0000000000350000-0x0000000000359000-memory.dmp trickbot_loader32 behavioral1/memory/2400-2-0x0000000000340000-0x0000000000347000-memory.dmp trickbot_loader32 behavioral1/memory/2400-4-0x0000000000350000-0x0000000000359000-memory.dmp trickbot_loader32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eb09f23e53fc62dbcc8b7d684eb3195d_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb09f23e53fc62dbcc8b7d684eb3195d_JaffaCakes118.exe