Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82093c0b546f5772892f288ea0096bcc70196fa063ef05676ffa1907967d580e.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_82093c0b546f5772892f288ea0096bcc70196fa063ef05676ffa1907967d580e.dll
-
Size
440KB
-
MD5
cd59d10b277d19234829f14b89dfd232
-
SHA1
7bd662e7bd53027bb67622e486b2c3f48ecaae69
-
SHA256
82093c0b546f5772892f288ea0096bcc70196fa063ef05676ffa1907967d580e
-
SHA512
c10ad70c9e581b78f50c9f028832c5768fcfcb27920fd715fde2ea94ff58b28c8ff37eab6ab0acf114cc48fc5576d17a06eca7841e01360f518612cfc03dfb11
-
SSDEEP
6144:v5+iRFTkRhO9SEptZtfherliYSuTNpBRaj4gzaxCdKJjWJFWMaDTX3H:JFTkwtZTm4EBpL0zacMScx7
Malware Config
Extracted
trickbot
100019
rob141
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 228 4528 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 184 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 464 wrote to memory of 4528 464 rundll32.exe 83 PID 464 wrote to memory of 4528 464 rundll32.exe 83 PID 464 wrote to memory of 4528 464 rundll32.exe 83 PID 4528 wrote to memory of 2236 4528 rundll32.exe 84 PID 4528 wrote to memory of 2236 4528 rundll32.exe 84 PID 4528 wrote to memory of 2236 4528 rundll32.exe 84 PID 4528 wrote to memory of 184 4528 rundll32.exe 85 PID 4528 wrote to memory of 184 4528 rundll32.exe 85 PID 4528 wrote to memory of 184 4528 rundll32.exe 85 PID 4528 wrote to memory of 184 4528 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82093c0b546f5772892f288ea0096bcc70196fa063ef05676ffa1907967d580e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82093c0b546f5772892f288ea0096bcc70196fa063ef05676ffa1907967d580e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2236
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 6643⤵
- Program crash
PID:228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4528 -ip 45281⤵PID:3060