Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe
-
Size
345KB
-
MD5
ee1695d9862cff54cc89dd675a5c18a1
-
SHA1
72d76fb0878b1e670522bfe9d64530f9fb82b862
-
SHA256
5864e2dcc9ed320194285961dfc1eb46af157fd796aa8cbd6e64e7c42a79e3f9
-
SHA512
f802ff8830f0a5a869f98c44267c3f41f0df986bdeaa9420d1139f82104c0c13d4504b80892765fdce6078c406a6d8042bd6ecb3c02dc9a46025f5dc8b9729b6
-
SSDEEP
6144:iE/K2hABcrNOf4flKAr290hv5nJ695c0n8OyebcJCkTc2e/RLXK:igK2hABONOfQhrAev5JdOdcpu
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2540-1-0x0000000000380000-0x00000000003A9000-memory.dmp trickbot_loader32 behavioral1/memory/2540-10-0x0000000000380000-0x00000000003A9000-memory.dmp trickbot_loader32 behavioral1/memory/2540-9-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 behavioral1/memory/1960-25-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 behavioral1/memory/3000-38-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 2240 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe -
pid Process 2740 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2520 sc.exe 2748 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe Token: SeTcbPrivilege 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2008 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2008 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2008 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2008 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1736 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1736 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1736 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1736 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1976 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 33 PID 2540 wrote to memory of 1976 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 33 PID 2540 wrote to memory of 1976 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 33 PID 2540 wrote to memory of 1976 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 33 PID 2540 wrote to memory of 1960 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 36 PID 2540 wrote to memory of 1960 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 36 PID 2540 wrote to memory of 1960 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 36 PID 2540 wrote to memory of 1960 2540 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 36 PID 2008 wrote to memory of 2520 2008 cmd.exe 37 PID 2008 wrote to memory of 2520 2008 cmd.exe 37 PID 2008 wrote to memory of 2520 2008 cmd.exe 37 PID 2008 wrote to memory of 2520 2008 cmd.exe 37 PID 1736 wrote to memory of 2748 1736 cmd.exe 38 PID 1736 wrote to memory of 2748 1736 cmd.exe 38 PID 1736 wrote to memory of 2748 1736 cmd.exe 38 PID 1736 wrote to memory of 2748 1736 cmd.exe 38 PID 1976 wrote to memory of 2740 1976 cmd.exe 39 PID 1976 wrote to memory of 2740 1976 cmd.exe 39 PID 1976 wrote to memory of 2740 1976 cmd.exe 39 PID 1976 wrote to memory of 2740 1976 cmd.exe 39 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 1960 wrote to memory of 2764 1960 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 40 PID 2916 wrote to memory of 3000 2916 taskeng.exe 43 PID 2916 wrote to memory of 3000 2916 taskeng.exe 43 PID 2916 wrote to memory of 3000 2916 taskeng.exe 43 PID 2916 wrote to memory of 3000 2916 taskeng.exe 43 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 PID 3000 wrote to memory of 1564 3000 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2764
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {49E62ED9-3F81-4466-B513-64DE0E9EF44F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2872745919-2748461613-2989606286-1000\0f5007522459c86e95ffcc62f32308f1_4d69f9e1-559c-46cf-82ac-67913db47c55
Filesize1KB
MD575ca09253840b94cfc51960af2a7d7d1
SHA127ba7787208e175bf77a62c1c3196a42e77dcd10
SHA256ff9176dfc1cc1730f289e5080b156edbc3b3e0d9ed5db6c6a4c3734dd7fd79cc
SHA512719b77111bdb178be8db4a70396e8d61631419b85ce486ac93223a277a73ee49d72f9186237281e7fb1dbca2a0b57bfa82240797d5c65d17fbe772d6dc5c345f
-
Filesize
345KB
MD5ee1695d9862cff54cc89dd675a5c18a1
SHA172d76fb0878b1e670522bfe9d64530f9fb82b862
SHA2565864e2dcc9ed320194285961dfc1eb46af157fd796aa8cbd6e64e7c42a79e3f9
SHA512f802ff8830f0a5a869f98c44267c3f41f0df986bdeaa9420d1139f82104c0c13d4504b80892765fdce6078c406a6d8042bd6ecb3c02dc9a46025f5dc8b9729b6