Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe
-
Size
345KB
-
MD5
ee1695d9862cff54cc89dd675a5c18a1
-
SHA1
72d76fb0878b1e670522bfe9d64530f9fb82b862
-
SHA256
5864e2dcc9ed320194285961dfc1eb46af157fd796aa8cbd6e64e7c42a79e3f9
-
SHA512
f802ff8830f0a5a869f98c44267c3f41f0df986bdeaa9420d1139f82104c0c13d4504b80892765fdce6078c406a6d8042bd6ecb3c02dc9a46025f5dc8b9729b6
-
SSDEEP
6144:iE/K2hABcrNOf4flKAr290hv5nJ695c0n8OyebcJCkTc2e/RLXK:igK2hABONOfQhrAev5JdOdcpu
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3160-1-0x0000000000E00000-0x0000000000E29000-memory.dmp trickbot_loader32 behavioral2/memory/3160-7-0x0000000000E00000-0x0000000000E29000-memory.dmp trickbot_loader32 behavioral2/memory/3160-6-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 behavioral2/memory/5008-22-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 behavioral2/memory/5008-25-0x0000000000870000-0x0000000000899000-memory.dmp trickbot_loader32 behavioral2/memory/4776-40-0x0000000000400000-0x000000000045D000-memory.dmp trickbot_loader32 behavioral2/memory/4776-43-0x0000000000A00000-0x0000000000A29000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exepid Process 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exeee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exedescription pid Process Token: SeTcbPrivilege 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exeee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exedescription pid Process procid_target PID 3160 wrote to memory of 5008 3160 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 86 PID 3160 wrote to memory of 5008 3160 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 86 PID 3160 wrote to memory of 5008 3160 ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe 86 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 5008 wrote to memory of 468 5008 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 90 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 PID 4776 wrote to memory of 4088 4776 ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee1695d9862cff54cc89dd675a5c18a1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:468
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\ee1796d9972cff64cc99dd786a6c19a1_KaffaDaket119.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\0f5007522459c86e95ffcc62f32308f1_03d68389-5a68-4d9e-92ac-47b927e624dd
Filesize1KB
MD52a570d2fe857c5a6be34088b8b3f0e5b
SHA17814aabe36a38d0b0593d8f582e0f2e091546531
SHA2565fc9430690c16b42e9cfcc3a5d772d6ff3ced9257f170fffc563ea5ea5bc0a8f
SHA51206c1e3bc7e4d938006dcedcee4d64eed99d8596103948d9c4d38f851b0221ba853573f98a0eefc3b7391a6fc90da583013a6030319d7b98a4bf138d46c25a0c7
-
Filesize
345KB
MD5ee1695d9862cff54cc89dd675a5c18a1
SHA172d76fb0878b1e670522bfe9d64530f9fb82b862
SHA2565864e2dcc9ed320194285961dfc1eb46af157fd796aa8cbd6e64e7c42a79e3f9
SHA512f802ff8830f0a5a869f98c44267c3f41f0df986bdeaa9420d1139f82104c0c13d4504b80892765fdce6078c406a6d8042bd6ecb3c02dc9a46025f5dc8b9729b6