Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 22:50
Behavioral task
behavioral1
Sample
ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe
-
Size
108KB
-
MD5
ee94af1e9e502cb1a00ee428a3f9b7db
-
SHA1
df9ac0683a9625c29d9c3afc392ea424e1f8fa50
-
SHA256
b7b505db914cbd1662386002820f6e75ac5a4f440cd1a9213221e5401c888356
-
SHA512
be96fed8e0a78f3bdcbd05f493c6812fed470648520cffaa6267a464aec08a19c7b02cc5833554c42dcf6203afefe1f4e783a0635ad61936c1916e8b7faca21a
-
SSDEEP
1536:UeQk9HoFsY9tcM/Izy5TTeKC3bvBmB3PBXgA4uD6EcnVrWM5U5maTJNo8hz3D:9Qeoh/I25TCKGvgB5XT4ZVaMKmKJ5
Malware Config
Extracted
trickbot
1000474
jim579
51.68.247.62:443
37.228.117.146:443
91.132.139.170:443
37.44.212.216:443
31.184.253.37:443
51.254.69.244:443
194.5.250.82:443
5.230.22.40:443
185.222.202.222:443
46.30.41.229:443
203.23.128.168:443
190.154.203.218:449
189.80.134.122:449
200.116.199.10:449
181.113.20.186:449
187.58.56.26:449
146.196.122.167:449
177.103.240.149:449
181.199.102.179:449
200.21.51.38:449
181.49.61.237:449
190.152.4.210:449
138.59.233.5:449
36.89.85.103:449
45.161.33.88:449
186.42.185.10:449
170.233.120.53:449
187.110.100.122:449
200.153.15.178:449
186.42.98.254:449
181.129.93.226:449
186.42.226.46:449
190.13.160.19:449
186.183.199.114:449
170.84.78.117:449
190.152.4.98:449
181.196.61.110:449
138.185.25.228:449
200.35.56.81:449
186.42.186.202:449
185.70.182.162:449
91.207.185.73:449
181.129.49.98:449
181.115.168.69:449
-
autorunControl:GetSystemInfoName:systeminfoName:pwgrab
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1204 ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1204 1312 taskeng.exe 31 PID 1312 wrote to memory of 1204 1312 taskeng.exe 31 PID 1312 wrote to memory of 1204 1312 taskeng.exe 31 PID 1312 wrote to memory of 1204 1312 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2644
-
C:\Windows\system32\taskeng.exetaskeng.exe {575BFD29-508B-44B1-BA68-8FBB07E0AE61} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Roaming\netcloud\ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\netcloud\ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5ee94af1e9e502cb1a00ee428a3f9b7db
SHA1df9ac0683a9625c29d9c3afc392ea424e1f8fa50
SHA256b7b505db914cbd1662386002820f6e75ac5a4f440cd1a9213221e5401c888356
SHA512be96fed8e0a78f3bdcbd05f493c6812fed470648520cffaa6267a464aec08a19c7b02cc5833554c42dcf6203afefe1f4e783a0635ad61936c1916e8b7faca21a