Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2024 08:08
General
-
Target
ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe
-
Size
108KB
-
MD5
ee94af1e9e502cb1a00ee428a3f9b7db
-
SHA1
df9ac0683a9625c29d9c3afc392ea424e1f8fa50
-
SHA256
b7b505db914cbd1662386002820f6e75ac5a4f440cd1a9213221e5401c888356
-
SHA512
be96fed8e0a78f3bdcbd05f493c6812fed470648520cffaa6267a464aec08a19c7b02cc5833554c42dcf6203afefe1f4e783a0635ad61936c1916e8b7faca21a
-
SSDEEP
1536:UeQk9HoFsY9tcM/Izy5TTeKC3bvBmB3PBXgA4uD6EcnVrWM5U5maTJNo8hz3D:9Qeoh/I25TCKGvgB5XT4ZVaMKmKJ5
Malware Config
Extracted
trickbot
1000474
jim579
51.68.247.62:443
37.228.117.146:443
91.132.139.170:443
37.44.212.216:443
31.184.253.37:443
51.254.69.244:443
194.5.250.82:443
5.230.22.40:443
185.222.202.222:443
46.30.41.229:443
203.23.128.168:443
190.154.203.218:449
189.80.134.122:449
200.116.199.10:449
181.113.20.186:449
187.58.56.26:449
146.196.122.167:449
177.103.240.149:449
181.199.102.179:449
200.21.51.38:449
181.49.61.237:449
190.152.4.210:449
138.59.233.5:449
36.89.85.103:449
45.161.33.88:449
186.42.185.10:449
170.233.120.53:449
187.110.100.122:449
200.153.15.178:449
186.42.98.254:449
181.129.93.226:449
186.42.226.46:449
190.13.160.19:449
186.183.199.114:449
170.84.78.117:449
190.152.4.98:449
181.196.61.110:449
138.185.25.228:449
200.35.56.81:449
186.42.186.202:449
185.70.182.162:449
91.207.185.73:449
181.129.49.98:449
181.115.168.69:449
-
autorunControl:GetSystemInfoName:systeminfoName:pwgrab
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3944 ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3944 ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee94af1e9e502cb1a00ee428a3f9b7db_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3648
-
C:\Users\Admin\AppData\Roaming\netcloud\ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exeC:\Users\Admin\AppData\Roaming\netcloud\ee94af1e9e702cb1a00ee428a3f9b9db_LaffaCameu118.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5ee94af1e9e502cb1a00ee428a3f9b7db
SHA1df9ac0683a9625c29d9c3afc392ea424e1f8fa50
SHA256b7b505db914cbd1662386002820f6e75ac5a4f440cd1a9213221e5401c888356
SHA512be96fed8e0a78f3bdcbd05f493c6812fed470648520cffaa6267a464aec08a19c7b02cc5833554c42dcf6203afefe1f4e783a0635ad61936c1916e8b7faca21a