Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
-
Size
560KB
-
MD5
0ad4daf48d4937ceeea3f0868cf3984a
-
SHA1
0842f3c5f0fc316ad4a4c0ae8011dfce85502933
-
SHA256
2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d
-
SHA512
9a548e4db6e2306429746a7950b970faf606ae0daff65368a67e989be69913863c485c3b94c50e83aa0aeb6f581014927c7582d63a990b293e68e055391289ea
-
SSDEEP
12288:Qom4+pRCMP6uCgtrQ8TJ6uaEDiNusuJMQpQgxb+wf:vmdp4MP6arFt6uaEDSuYQpfxqa
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 8 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2096-3-0x00000000002D0000-0x00000000002FF000-memory.dmp trickbot_loader32 behavioral1/memory/2096-4-0x0000000000300000-0x0000000000331000-memory.dmp trickbot_loader32 behavioral1/memory/2096-0-0x0000000000300000-0x0000000000331000-memory.dmp trickbot_loader32 behavioral1/memory/2284-15-0x0000000000390000-0x00000000003C1000-memory.dmp trickbot_loader32 behavioral1/memory/2096-20-0x0000000000300000-0x0000000000331000-memory.dmp trickbot_loader32 behavioral1/memory/2284-21-0x0000000000390000-0x00000000003C1000-memory.dmp trickbot_loader32 behavioral1/memory/2700-26-0x0000000000510000-0x0000000000541000-memory.dmp trickbot_loader32 behavioral1/memory/2700-31-0x0000000000510000-0x0000000000541000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2284 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 30 PID 2096 wrote to memory of 2284 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 30 PID 2096 wrote to memory of 2284 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 30 PID 2096 wrote to memory of 2284 2096 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 30 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2284 wrote to memory of 2100 2284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 31 PID 2724 wrote to memory of 2700 2724 taskeng.exe 34 PID 2724 wrote to memory of 2700 2724 taskeng.exe 34 PID 2724 wrote to memory of 2700 2724 taskeng.exe 34 PID 2724 wrote to memory of 2700 2724 taskeng.exe 34 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 PID 2700 wrote to memory of 2052 2700 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exeC:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2100
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B3F3D08D-F0A3-4BAB-8C06-6442C97257B3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exeC:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
Filesize560KB
MD50ad4daf48d4937ceeea3f0868cf3984a
SHA10842f3c5f0fc316ad4a4c0ae8011dfce85502933
SHA2562db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d
SHA5129a548e4db6e2306429746a7950b970faf606ae0daff65368a67e989be69913863c485c3b94c50e83aa0aeb6f581014927c7582d63a990b293e68e055391289ea