Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 23:27

General

  • Target

    JaffaCakes118_b84b5ffa65552140676968d0bafc52a00cd0fd9a5f7b70809d11a2b321ac834b.doc

  • Size

    2.1MB

  • MD5

    3bc400ab428b5c6f229b6158a4c084e9

  • SHA1

    76b70d96c464f68b531f3c040aabc4b5d8a8ffde

  • SHA256

    b84b5ffa65552140676968d0bafc52a00cd0fd9a5f7b70809d11a2b321ac834b

  • SHA512

    8be8e08b756e6d3c3ce0702ea5028fd8d4357e21472374276184f3e4e876fdff1929f34a07322f49154f04a488c2cf43f4addc56e4faea391e304c2abf4149c1

  • SSDEEP

    24576:mOIFcmtE7voEOJ4wDEeKKeD0qxDRQ85THxfOl1zEEVQW/b06UKQwZ7IPN/ewItlZ:mHIQBJKKULx+9EEhg6tZsUf+Mz

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b84b5ffa65552140676968d0bafc52a00cd0fd9a5f7b70809d11a2b321ac834b.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c c:\programdata\HighScores.bat
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\trone\altogether4127453.vbs"
        3⤵
          PID:2032
        • C:\Windows\system32\PING.EXE
          ping w 5000 ya.fr
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2852
        • C:\Windows\system32\PING.EXE
          ping w 5000 htr-oi.io
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2504
        • C:\Windows\system32\rundll32.exe
          rundll32 c:\trone\1\ExistingExcel.dll,DllRegisterServer1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3212
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 c:\trone\1\ExistingExcel.dll,DllRegisterServer1
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3664
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe
              5⤵
                PID:4560
              • C:\Windows\system32\wermgr.exe
                C:\Windows\system32\wermgr.exe
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3984
          • C:\Windows\system32\PING.EXE
            ping w 5000 htr-oi.io
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\TCDE1FD.tmp\gb.xsl

        Filesize

        262KB

        MD5

        51d32ee5bc7ab811041f799652d26e04

        SHA1

        412193006aa3ef19e0a57e16acf86b830993024a

        SHA256

        6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

        SHA512

        5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        1KB

        MD5

        23df7d7d11c7a6e831ea7b1a44762f8a

        SHA1

        6037b6be47099e4324cfb6f9053caa7b8555476e

        SHA256

        dab14bcd11bcfbb8b9655972d493c34c793a56af5f95a38a181e32637ca51c85

        SHA512

        4435ef60bbafd6bede1873631537cfbbe037afb9ea564818cdb42b8346742ba5b4ee6c64eba59a5f76a56e1047b716c56ac8abdf2aae9fd6f6a13e8d9629a559

      • C:\trone\altogether4127453.vbs

        Filesize

        815KB

        MD5

        12b35355d1b3d54916aeec7f3c25aa9c

        SHA1

        6304b01173e6fc6af5d15f70b2da7ef00af01b20

        SHA256

        ab877698827bb56c10819d32a74c7b9e632b759c2b5a85c5921e17b892cfb716

        SHA512

        59812d65b76b56fc0adc1237a8e68058acc9ad65c3a3a993e09cd44f29218c8d83bcfc2c6f2de3e04835e2ce23acf9a4db31d59c6e74144f6aa1eb0193e8eef1

      • \??\c:\programdata\HighScores.bat

        Filesize

        883KB

        MD5

        3826c75e009858f82f7ad8342116a34b

        SHA1

        bc60b40dbbd4360b203ba5f1cf7229264214c957

        SHA256

        40337427a39cb76487f4c450a4f36f2a94489995199f3df0de906bfeaa570dad

        SHA512

        cc42356930b9147717a00d55315b2c02e36c85a0317da7684a4b2eda37218f26c1accae0914ada6173b5f3366323ff65a62cb50b0c84d1a16f81be898320a803

      • \??\c:\trone\1\ExistingExcel.dll

        Filesize

        483KB

        MD5

        1da055b46fb0698f80a4404b3a3a63b3

        SHA1

        97609b1d447453fa5e431f90668678ac8c090730

        SHA256

        71b4913ef363073f0ecc4b4c5af3ad4b4889ac7f22a3e34d54c9b6572b83c483

        SHA512

        ddebd8487dc0dfd936f65377b7cc072dfc28ecb90943c4fea0e6f0c1ad7563964998d1ba56edce60f64fe076558d43618fb789c2278631f289e6a6cf5a936e23

      • memory/3664-191-0x0000000002B20000-0x0000000002B63000-memory.dmp

        Filesize

        268KB

      • memory/3664-189-0x0000000002B20000-0x0000000002B63000-memory.dmp

        Filesize

        268KB

      • memory/3984-190-0x00000223D2450000-0x00000223D2451000-memory.dmp

        Filesize

        4KB

      • memory/4940-32-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-49-0x00007FF94DA8D000-0x00007FF94DA8E000-memory.dmp

        Filesize

        4KB

      • memory/4940-14-0x00007FF90B350000-0x00007FF90B360000-memory.dmp

        Filesize

        64KB

      • memory/4940-10-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-15-0x00007FF90B350000-0x00007FF90B360000-memory.dmp

        Filesize

        64KB

      • memory/4940-7-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-6-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-24-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-25-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-1-0x00007FF94DA8D000-0x00007FF94DA8E000-memory.dmp

        Filesize

        4KB

      • memory/4940-35-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-33-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-12-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-13-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-48-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-11-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-50-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-51-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-52-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-53-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-8-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-59-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-63-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-9-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

        Filesize

        2.0MB

      • memory/4940-5-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

        Filesize

        64KB

      • memory/4940-4-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

        Filesize

        64KB

      • memory/4940-2-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

        Filesize

        64KB

      • memory/4940-3-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

        Filesize

        64KB

      • memory/4940-0-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

        Filesize

        64KB