Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20d82f4ec2184bd5affa09580cf84899db2e23b7594aec562f4a38338c04021e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_20d82f4ec2184bd5affa09580cf84899db2e23b7594aec562f4a38338c04021e.dll
-
Size
2.2MB
-
MD5
aea355c10ebf1e7cd6f1ea486dfdf93e
-
SHA1
ed12a8d6459e255bbe2b13de853e3f1ef9b2b73a
-
SHA256
20d82f4ec2184bd5affa09580cf84899db2e23b7594aec562f4a38338c04021e
-
SHA512
22552f84a3ed523095b90abaa4fd830fcc1366828ac8303d0691ad28e54aea660cc946bca48421a7350db8601d7775506006cbd0b385a1b0c6b417a0e7ca268f
-
SSDEEP
6144:Zo0gTwr/cG3J8Wt/s1XGxfSCkq/vWc3Wh0lxPIerqhg:ZoidiofStZ
Malware Config
Extracted
trickbot
100021
rob142
181.129.85.98:443
189.112.119.205:443
189.51.118.78:443
186.121.214.106:443
49.176.188.184:443
61.69.102.170:443
213.32.252.221:443
89.46.216.2:443
103.36.79.3:443
103.108.97.51:443
95.140.217.242:443
41.175.22.226:443
190.109.169.161:443
186.159.12.18:443
190.109.171.17:443
181.196.148.202:443
186.47.75.58:443
186.42.212.30:443
190.214.21.14:443
187.108.32.133:443
201.184.226.74:443
186.159.5.177:443
- autorun
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 2616 wrote to memory of 1960 2616 rundll32.exe 31 PID 1960 wrote to memory of 2904 1960 rundll32.exe 32 PID 1960 wrote to memory of 2904 1960 rundll32.exe 32 PID 1960 wrote to memory of 2904 1960 rundll32.exe 32 PID 1960 wrote to memory of 2904 1960 rundll32.exe 32 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33 PID 1960 wrote to memory of 1052 1960 rundll32.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20d82f4ec2184bd5affa09580cf84899db2e23b7594aec562f4a38338c04021e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20d82f4ec2184bd5affa09580cf84899db2e23b7594aec562f4a38338c04021e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2904
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-