Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe
-
Size
479KB
-
MD5
1e1fc25b7f286ee9bf1abf6a0b69b64f
-
SHA1
d1c47ef1377042baa604f5746102ade7fa4f87ce
-
SHA256
7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb
-
SHA512
9e3f0832b56dd5d83d3f8279631447efb9f95a3859bdfa091e07f2a224dc18bbb2f8fe6de58f7dd29f27ab7561b8f00272acb8e00a59f413899c6ab92dcf0788
-
SSDEEP
6144:yYt2FSUv3yC3heU7M2m7t1jvQ05/obBshB6VxXtExQeXk4qyU4t1KkA+N96nqe/X:ybTXbzFdCaxvy5kD+N0Uw+EYznwTrB3j
Malware Config
Extracted
trickbot
100010
mor13
5.34.180.180:443
64.74.160.228:443
198.46.198.116:443
5.34.180.185:443
107.152.46.188:443
195.123.241.214:443
23.254.224.2:443
107.172.188.113:443
200.52.147.93:443
185.198.59.45:443
45.14.226.101:443
185.82.126.38:443
85.204.116.139:443
45.155.173.248:443
103.91.244.50:443
45.230.244.20:443
45.226.124.226:443
187.84.95.6:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
180.92.158.244:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 3836 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4076 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3836 wrote to memory of 1832 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 91 PID 3836 wrote to memory of 1832 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 91 PID 3836 wrote to memory of 4076 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 92 PID 3836 wrote to memory of 4076 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 92 PID 3836 wrote to memory of 4076 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 92 PID 3836 wrote to memory of 4076 3836 JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7aca6df0697411042832dbb88e1b2f650f646a35509830e9bf9dccb02e7529cb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵PID:1832
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 4922⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3836 -ip 38361⤵PID:4592