Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2024, 16:34 UTC

General

  • Target

    JaffaCakes118_52ccbd5a7256b58badf5bd22d5b03256987dfbbf2511612957b7c8d6f3dba91c.exe

  • Size

    516KB

  • MD5

    ac5f0a87c6b285796694489de237f925

  • SHA1

    22b56dec4c84663adde02195d68cb07becf9c58c

  • SHA256

    52ccbd5a7256b58badf5bd22d5b03256987dfbbf2511612957b7c8d6f3dba91c

  • SHA512

    b83d0e1bdfdebb933bf87f277a5054666d39a8905e165aca7102645d2618b81ecb292863a18b10b979bf518428afc2ab3c354b60afae498a7903c7b36339788e

  • SSDEEP

    12288:cbVMh0tRyr3W3SBniM+uwkMx8nXoTT0WJZmo:WMh0tRy53lY8X2xJZmo

Malware Config

Extracted

Family

trickbot

Version

2000033

Botnet

tot153

C2

179.42.137.102:443

191.36.152.198:443

179.42.137.104:443

179.42.137.106:443

179.42.137.108:443

202.183.12.124:443

194.190.18.122:443

103.56.207.230:443

171.103.187.218:449

171.103.189.118:449

18.139.111.104:443

179.42.137.105:443

186.4.193.75:443

171.101.229.2:449

179.42.137.107:443

103.56.43.209:449

179.42.137.110:443

45.181.207.156:443

197.44.54.162:449

179.42.137.109:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64
1
RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc=

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_52ccbd5a7256b58badf5bd22d5b03256987dfbbf2511612957b7c8d6f3dba91c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_52ccbd5a7256b58badf5bd22d5b03256987dfbbf2511612957b7c8d6f3dba91c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\system32\wermgr.exe
      C:\Windows\system32\wermgr.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2884
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe
      2⤵
        PID:2064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 592
        2⤵
        • Program crash
        PID:3704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4484 -ip 4484
      1⤵
        PID:3504

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        22.49.80.91.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        22.49.80.91.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        4.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        4.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        228.249.119.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        228.249.119.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.42.69.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.42.69.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        56.163.245.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.163.245.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        217.135.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        217.135.221.88.in-addr.arpa
        IN PTR
        Response
        217.135.221.88.in-addr.arpa
        IN PTR
        a88-221-135-217deploystaticakamaitechnologiescom
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        83.210.23.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        83.210.23.2.in-addr.arpa
        IN PTR
        Response
        83.210.23.2.in-addr.arpa
        IN PTR
        a2-23-210-83deploystaticakamaitechnologiescom
      • flag-us
        DNS
        31.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        31.243.111.52.in-addr.arpa
        IN PTR
        Response
      • 202.183.12.124:443
        wermgr.exe
        260 B
        5
      • 179.42.137.105:443
        wermgr.exe
        260 B
        5
      • 171.103.187.218:449
        wermgr.exe
        260 B
        5
      • 179.42.137.102:443
        wermgr.exe
        260 B
        5
      • 197.44.54.162:449
        wermgr.exe
        260 B
        5
      • 191.36.152.198:443
        wermgr.exe
        260 B
        200 B
        5
        5
      • 194.190.18.122:443
        wermgr.exe
        208 B
        4
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        97.17.167.52.in-addr.arpa
        dns
        142 B
        145 B
        2
        1

        DNS Request

        97.17.167.52.in-addr.arpa

        DNS Request

        97.17.167.52.in-addr.arpa

      • 8.8.8.8:53
        22.49.80.91.in-addr.arpa
        dns
        70 B
        145 B
        1
        1

        DNS Request

        22.49.80.91.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        4.159.190.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        4.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        228.249.119.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        228.249.119.40.in-addr.arpa

      • 8.8.8.8:53
        241.42.69.40.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        241.42.69.40.in-addr.arpa

      • 8.8.8.8:53
        56.163.245.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        56.163.245.4.in-addr.arpa

      • 8.8.8.8:53
        217.135.221.88.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        217.135.221.88.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        83.210.23.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        83.210.23.2.in-addr.arpa

      • 8.8.8.8:53
        31.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        31.243.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2884-9-0x0000018960370000-0x0000018960399000-memory.dmp

        Filesize

        164KB

      • memory/2884-10-0x0000018960620000-0x0000018960621000-memory.dmp

        Filesize

        4KB

      • memory/2884-13-0x0000018960370000-0x0000018960399000-memory.dmp

        Filesize

        164KB

      • memory/4484-0-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/4484-4-0x0000000002340000-0x000000000237C000-memory.dmp

        Filesize

        240KB

      • memory/4484-5-0x0000000002690000-0x00000000026CB000-memory.dmp

        Filesize

        236KB

      • memory/4484-6-0x0000000002690000-0x00000000026CB000-memory.dmp

        Filesize

        236KB

      • memory/4484-8-0x0000000010000000-0x0000000010003000-memory.dmp

        Filesize

        12KB

      • memory/4484-7-0x00000000023F0000-0x00000000023F1000-memory.dmp

        Filesize

        4KB

      • memory/4484-11-0x0000000002320000-0x0000000002333000-memory.dmp

        Filesize

        76KB

      • memory/4484-12-0x0000000002690000-0x00000000026CB000-memory.dmp

        Filesize

        236KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.