Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_481010be85e6c9dcd01681b53192e393f909de3eb9fd3ebcac321b8f4df3e2a9.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_481010be85e6c9dcd01681b53192e393f909de3eb9fd3ebcac321b8f4df3e2a9.dll
-
Size
1.7MB
-
MD5
727f2efbb50bba2aeaef8fca272a0a77
-
SHA1
0582f806f8b0ba31c1f1a939157dd4c544b838c8
-
SHA256
481010be85e6c9dcd01681b53192e393f909de3eb9fd3ebcac321b8f4df3e2a9
-
SHA512
0547cb0095e836ee6e17d967ff4439d6892eb4d4369c44fcd7ab0d8c84fcf90c22dc02165995bf9451a5d08ddf5d83f5b68235fba562e582dda1d404df411586
-
SSDEEP
1536:XmeVN7p5lgOPKuppLW8JCeaW8x1dGYkmemN0XAgmjei+vA2gcVPQqcUN:XPNLlRCUqW8xUmN0XAg1iZ2rQqcU
Malware Config
Extracted
trickbot
100021
rob142
181.129.85.98:443
189.112.119.205:443
189.51.118.78:443
186.121.214.106:443
49.176.188.184:443
61.69.102.170:443
213.32.252.221:443
89.46.216.2:443
103.36.79.3:443
103.108.97.51:443
95.140.217.242:443
41.175.22.226:443
190.109.169.161:443
186.159.12.18:443
190.109.171.17:443
181.196.148.202:443
186.47.75.58:443
186.42.212.30:443
190.214.21.14:443
187.108.32.133:443
201.184.226.74:443
186.159.5.177:443
- autorun
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1512 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 2372 wrote to memory of 344 2372 rundll32.exe 30 PID 344 wrote to memory of 2716 344 rundll32.exe 31 PID 344 wrote to memory of 2716 344 rundll32.exe 31 PID 344 wrote to memory of 2716 344 rundll32.exe 31 PID 344 wrote to memory of 2716 344 rundll32.exe 31 PID 344 wrote to memory of 1512 344 rundll32.exe 32 PID 344 wrote to memory of 1512 344 rundll32.exe 32 PID 344 wrote to memory of 1512 344 rundll32.exe 32 PID 344 wrote to memory of 1512 344 rundll32.exe 32 PID 344 wrote to memory of 1512 344 rundll32.exe 32 PID 344 wrote to memory of 1512 344 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481010be85e6c9dcd01681b53192e393f909de3eb9fd3ebcac321b8f4df3e2a9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481010be85e6c9dcd01681b53192e393f909de3eb9fd3ebcac321b8f4df3e2a9.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2716
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-