Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0705927f9f2aaf27d35655f5919414ec1c2b40ed7cb47287c64e99477a3c740.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_b0705927f9f2aaf27d35655f5919414ec1c2b40ed7cb47287c64e99477a3c740.dll
-
Size
573KB
-
MD5
2a82506aabdbe1f8f1df742c3a118603
-
SHA1
716bf12fe7b3be72c9ad9de18a7eeb67b5c35ffc
-
SHA256
b0705927f9f2aaf27d35655f5919414ec1c2b40ed7cb47287c64e99477a3c740
-
SHA512
10ad4a7f88dd1d2e47f967aa1ec7f0c468e90fbd388f72734726586bc31e17fba7dc6f6774152ddf3837a7372737115b9bfad66579e20d57765eb20f95a4b0a9
-
SSDEEP
12288:KZH7ymEvGjVj2VNYz6GC25e9+eqermKANUQZNrNzW6Tbh8EGpnMqBK0xZe:w+DGR3z6GC251fChAzDNzW2hnsnBK0x8
Malware Config
Extracted
trickbot
100019
get1
gasratab.com:443
parismana.com:443
londonho.com:443
- autorun
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2484 wrote to memory of 2748 2484 regsvr32.exe 30 PID 2748 wrote to memory of 2892 2748 regsvr32.exe 31 PID 2748 wrote to memory of 2892 2748 regsvr32.exe 31 PID 2748 wrote to memory of 2892 2748 regsvr32.exe 31 PID 2748 wrote to memory of 2892 2748 regsvr32.exe 31 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32 PID 2748 wrote to memory of 3020 2748 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0705927f9f2aaf27d35655f5919414ec1c2b40ed7cb47287c64e99477a3c740.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0705927f9f2aaf27d35655f5919414ec1c2b40ed7cb47287c64e99477a3c740.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2892
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-