Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8122e0f33a765b76f9d86289517ce4d1cec740eec6c2a8973647eff2af298879.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8122e0f33a765b76f9d86289517ce4d1cec740eec6c2a8973647eff2af298879.dll
-
Size
1.7MB
-
MD5
868efea18a79a62ecec7176f7ae6fbfb
-
SHA1
d65d71a3ca44776b1125b7ee01618128cc700788
-
SHA256
8122e0f33a765b76f9d86289517ce4d1cec740eec6c2a8973647eff2af298879
-
SHA512
8157556b146b2071ff8a0598a0a982053974aefbbe3f4e90b99692ed19e1c8c7bf089b2b90c3157fd9853d90dd2c2fe98d3fffdc3e6696c4db3bad364c1beddf
-
SSDEEP
1536:Ea9LBZTMimFXZqGOzNfgBgELgL5GgCdY:Ea9LBZxmFXZqGOz5YgE8dG9dY
Malware Config
Extracted
trickbot
100019
rob141
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 912 2824 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4080 wrote to memory of 2824 4080 rundll32.exe 82 PID 4080 wrote to memory of 2824 4080 rundll32.exe 82 PID 4080 wrote to memory of 2824 4080 rundll32.exe 82 PID 2824 wrote to memory of 4600 2824 rundll32.exe 83 PID 2824 wrote to memory of 4600 2824 rundll32.exe 83 PID 2824 wrote to memory of 4600 2824 rundll32.exe 83 PID 2824 wrote to memory of 3084 2824 rundll32.exe 84 PID 2824 wrote to memory of 3084 2824 rundll32.exe 84 PID 2824 wrote to memory of 3084 2824 rundll32.exe 84 PID 2824 wrote to memory of 3084 2824 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8122e0f33a765b76f9d86289517ce4d1cec740eec6c2a8973647eff2af298879.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8122e0f33a765b76f9d86289517ce4d1cec740eec6c2a8973647eff2af298879.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:4600
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 6523⤵
- Program crash
PID:912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2824 -ip 28241⤵PID:1500