Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2024, 17:35 UTC

General

  • Target

    JaffaCakes118_e55128056efbab7b249d6d2e1652177b5320d4baca60494a010e4f6225e632e5.dll

  • Size

    2.1MB

  • MD5

    b55f4d2d5a93277764bc4123ce091a2a

  • SHA1

    48411a3a42b265c1887661389a18983f5929a9f8

  • SHA256

    e55128056efbab7b249d6d2e1652177b5320d4baca60494a010e4f6225e632e5

  • SHA512

    511cb901356145b7845a5285f5b83e7faee2997f110e57c8f413307cb5bbf0bd9f87c9e0138f7293d904be7b26628db78271d66e06653fe44e97acca352e67f9

  • SSDEEP

    3072:mUd2wnncoy08JVRgsLFu17v5PjGjGIGI5JRZiGM652qRX8tfkFdRYCWcFEa+kR9:mmn1P8JV7YD5qfrdZiGhNW87zia+G9

Malware Config

Extracted

Family

trickbot

Version

100021

Botnet

rob142

C2

181.129.85.98:443

189.112.119.205:443

189.51.118.78:443

186.121.214.106:443

49.176.188.184:443

61.69.102.170:443

213.32.252.221:443

89.46.216.2:443

103.36.79.3:443

103.108.97.51:443

95.140.217.242:443

41.175.22.226:443

190.109.169.161:443

186.159.12.18:443

190.109.171.17:443

181.196.148.202:443

186.47.75.58:443

186.42.212.30:443

190.214.21.14:443

187.108.32.133:443

Attributes
  • autorun

ecc_pubkey.base64
1
RUNTMzAAAABbfmkJRvwyw7iFkX40hL2HwsUeOSZZZo0FRRWGkY6J1+gf3YKq13Ee4sY3Jb9/0myCr0MwzNK1K2l5yuY87nW29Q/yjMJG0ISDj0HNBC3G+ZGta6Oi9QkjCwnNGbw2hQ4=

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e55128056efbab7b249d6d2e1652177b5320d4baca60494a010e4f6225e632e5.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e55128056efbab7b249d6d2e1652177b5320d4baca60494a010e4f6225e632e5.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe
        3⤵
          PID:2912
        • C:\Windows\system32\wermgr.exe
          C:\Windows\system32\wermgr.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2992

    Network

      No results found
    • 41.175.22.226:443
      wermgr.exe
      152 B
      3
    • 61.69.102.170:443
      wermgr.exe
      152 B
      3
    • 189.51.118.78:443
      wermgr.exe
      152 B
      3
    • 213.32.252.221:443
      wermgr.exe
      152 B
      3
    • 190.109.169.161:443
      wermgr.exe
      152 B
      120 B
      3
      3
    • 103.108.97.51:443
      wermgr.exe
      152 B
      3
    • 181.129.85.98:443
      wermgr.exe
      152 B
      3
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-1-0x0000000000270000-0x00000000002B5000-memory.dmp

      Filesize

      276KB

    • memory/2084-0-0x0000000001E70000-0x00000000020CD000-memory.dmp

      Filesize

      2.4MB

    • memory/2084-3-0x0000000010000000-0x0000000010003000-memory.dmp

      Filesize

      12KB

    • memory/2084-2-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2084-6-0x0000000000270000-0x00000000002B5000-memory.dmp

      Filesize

      276KB

    • memory/2084-7-0x0000000010000000-0x0000000010003000-memory.dmp

      Filesize

      12KB

    • memory/2992-4-0x0000000000060000-0x0000000000088000-memory.dmp

      Filesize

      160KB

    • memory/2992-5-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2992-8-0x0000000000060000-0x0000000000088000-memory.dmp

      Filesize

      160KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.