Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
-
Size
560KB
-
MD5
0ad4daf48d4937ceeea3f0868cf3984a
-
SHA1
0842f3c5f0fc316ad4a4c0ae8011dfce85502933
-
SHA256
2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d
-
SHA512
9a548e4db6e2306429746a7950b970faf606ae0daff65368a67e989be69913863c485c3b94c50e83aa0aeb6f581014927c7582d63a990b293e68e055391289ea
-
SSDEEP
12288:Qom4+pRCMP6uCgtrQ8TJ6uaEDiNusuJMQpQgxb+wf:vmdp4MP6arFt6uaEDSuYQpfxqa
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 8 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1284-4-0x00000000027A0000-0x00000000027D1000-memory.dmp trickbot_loader32 behavioral2/memory/1284-1-0x00000000027A0000-0x00000000027D1000-memory.dmp trickbot_loader32 behavioral2/memory/1284-3-0x0000000002290000-0x00000000022BF000-memory.dmp trickbot_loader32 behavioral2/memory/2016-11-0x00000000021E0000-0x0000000002211000-memory.dmp trickbot_loader32 behavioral2/memory/1284-16-0x00000000027A0000-0x00000000027D1000-memory.dmp trickbot_loader32 behavioral2/memory/2016-17-0x00000000021E0000-0x0000000002211000-memory.dmp trickbot_loader32 behavioral2/memory/4944-22-0x0000000000FB0000-0x0000000000FE1000-memory.dmp trickbot_loader32 behavioral2/memory/4944-28-0x0000000000FB0000-0x0000000000FE1000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2016 1284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 82 PID 1284 wrote to memory of 2016 1284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 82 PID 1284 wrote to memory of 2016 1284 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 82 PID 2016 wrote to memory of 2896 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 83 PID 2016 wrote to memory of 2896 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 83 PID 2016 wrote to memory of 2896 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 83 PID 2016 wrote to memory of 2896 2016 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 83 PID 4944 wrote to memory of 3680 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 94 PID 4944 wrote to memory of 3680 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 94 PID 4944 wrote to memory of 3680 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 94 PID 4944 wrote to memory of 3680 4944 JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exeC:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2896
-
-
-
C:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exeC:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
PID:3680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\DirectTools\JaffaCakes118_2db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d.exe
Filesize560KB
MD50ad4daf48d4937ceeea3f0868cf3984a
SHA10842f3c5f0fc316ad4a4c0ae8011dfce85502933
SHA2562db98329abe8d8f56e35acb0268a04e62d6baf292b20029aa6fff0c339a76a9d
SHA5129a548e4db6e2306429746a7950b970faf606ae0daff65368a67e989be69913863c485c3b94c50e83aa0aeb6f581014927c7582d63a990b293e68e055391289ea