Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe
-
Size
443KB
-
MD5
fb48c7e0484133a84f8d4546da134a68
-
SHA1
e9e35fa02654e02529b09389fe6f5f53480291f8
-
SHA256
87ee9da95af924cb7cd7e8c3acdbc952b46377a8d0eb2150dfdab35def82ba51
-
SHA512
ed9b28f75b7ee12c197bf7a3ef11d3bc05bd1b3ec484ec209e5d30fa751be61e7aab39177b89725f2ce8007c99f82cdf543d2b138958ca12c61bb0eb4efe7513
-
SSDEEP
6144:f6ohM6XPOgAtlBxp++UwmidmDzqQ/ZhAcOiu+b53l/15:fBhhPktlXpsw74DZvpzfn
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/740-1-0x0000000000700000-0x0000000000729000-memory.dmp trickbot_loader32 behavioral2/memory/3704-25-0x00000000006E0000-0x0000000000709000-memory.dmp trickbot_loader32 behavioral2/memory/3704-22-0x0000000000400000-0x0000000000476000-memory.dmp trickbot_loader32 behavioral2/memory/740-7-0x0000000000700000-0x0000000000729000-memory.dmp trickbot_loader32 behavioral2/memory/740-6-0x0000000000400000-0x0000000000476000-memory.dmp trickbot_loader32 behavioral2/memory/4644-40-0x0000000000400000-0x0000000000476000-memory.dmp trickbot_loader32 behavioral2/memory/4644-43-0x00000000007C0000-0x00000000007E9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exefb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exepid Process 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exefb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exefb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exedescription pid Process Token: SeTcbPrivilege 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exefb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exefb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exedescription pid Process procid_target PID 740 wrote to memory of 3704 740 fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe 82 PID 740 wrote to memory of 3704 740 fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe 82 PID 740 wrote to memory of 3704 740 fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe 82 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 3704 wrote to memory of 3720 3704 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 83 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 PID 4644 wrote to memory of 3468 4644 fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb48c7e0484133a84f8d4546da134a68_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Roaming\WNetval\fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3720
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exeC:\Users\Admin\AppData\Roaming\WNetval\fb49c8e0494133a94f9d4647da134a79_KaffaDaket119.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-523280732-2327480845-3730041215-1000\0f5007522459c86e95ffcc62f32308f1_a5c5e2ae-85e3-447c-9e0b-c9a7b966d823
Filesize1KB
MD52a94fffdb5e5e8d5460ca7f47b2555aa
SHA19d896f8bb82d35881a9653064b6a92403b7bcfff
SHA256ff097f9e62afd5dcfaef8c2c3ed607c5ebf47dc2db2a1aa81a116c763d66f2bc
SHA512d380d511a13dc573f4823ff57c1ab32f0df2936ce6df5c0aec0fa7df0e34c5a6fc7916c1d332e65780d4c2ac2a686015be389c4cc5a33ea0b20f7b11e8700f8c
-
Filesize
443KB
MD5fb48c7e0484133a84f8d4546da134a68
SHA1e9e35fa02654e02529b09389fe6f5f53480291f8
SHA25687ee9da95af924cb7cd7e8c3acdbc952b46377a8d0eb2150dfdab35def82ba51
SHA512ed9b28f75b7ee12c197bf7a3ef11d3bc05bd1b3ec484ec209e5d30fa751be61e7aab39177b89725f2ce8007c99f82cdf543d2b138958ca12c61bb0eb4efe7513