Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe
-
Size
897KB
-
MD5
73fcd0d25a449025c36cb0a7b41ac194
-
SHA1
7fdbdef1d22ca82a4a32ac3ca9ff1540fafd0e0c
-
SHA256
e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf
-
SHA512
cb6870e481b3567c53d7f6a09d88bac0a2c51ab572ac77cd6552545c3335ecaaff856aa4cbc45bd8f7c1dcf4ff72f0a7dafc679e3554816ecead02a1025333b8
-
SSDEEP
12288:xoI9bkG8Si/EB3hUgGL0o6ImasLOlMS9mfzID6nwg575IYh1gXPwbnfh4N1N1yXW:xp9bkGq8BOhIc9kcOwg575P1BnyK0UO
Malware Config
Extracted
trickbot
100010
rob35
5.34.180.180:443
64.74.160.228:443
198.46.198.116:443
5.34.180.185:443
107.152.46.188:443
195.123.241.214:443
23.254.224.2:443
107.172.188.113:443
200.52.147.93:443
185.198.59.45:443
45.14.226.101:443
185.82.126.38:443
85.204.116.139:443
45.155.173.248:443
103.91.244.50:443
45.230.244.20:443
45.226.124.226:443
187.84.95.6:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
180.92.158.244:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 35 2724 cmd.exe 38 2724 cmd.exe 42 2724 cmd.exe 43 2724 cmd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 880 4052 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2724 cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2724 4052 JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe 98 PID 4052 wrote to memory of 2724 4052 JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe 98 PID 4052 wrote to memory of 2724 4052 JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe 98 PID 4052 wrote to memory of 2724 4052 JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e3a8d7e8cda02243bb9c186cb741216c18d845683a6cdca2117866c7f103e6cf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 4922⤵
- Program crash
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4052 -ip 40521⤵PID:4036