Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9613e0f2fb488663a79c2e6b9303dd80860408e6e466c19f048a43d350983179.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_9613e0f2fb488663a79c2e6b9303dd80860408e6e466c19f048a43d350983179.dll
-
Size
440KB
-
MD5
e8d11a57bca7ca562afe846d8b17f047
-
SHA1
b7b234724cd6b32b5269bd1575000a932de3b4aa
-
SHA256
9613e0f2fb488663a79c2e6b9303dd80860408e6e466c19f048a43d350983179
-
SHA512
a4f2b30e649a6f2806f4e4a0c644b9eaea818e89da707c39680ff167d5f6f1d770cd389d2c71cbedf6fe9b8d5e49583b0a11855d2692f00225cd35f4a42c62f6
-
SSDEEP
6144:v5+iRFTkRhO9SE/tZtfherliYSuTNpBRaj4gzaxCdKJjWJFWMaDTX3H:JFTkutZTm4EBpL0zacMScx7
Malware Config
Extracted
trickbot
100019
rob141
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2220 4104 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4704 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4104 3252 rundll32.exe 83 PID 3252 wrote to memory of 4104 3252 rundll32.exe 83 PID 3252 wrote to memory of 4104 3252 rundll32.exe 83 PID 4104 wrote to memory of 404 4104 rundll32.exe 84 PID 4104 wrote to memory of 404 4104 rundll32.exe 84 PID 4104 wrote to memory of 404 4104 rundll32.exe 84 PID 4104 wrote to memory of 4704 4104 rundll32.exe 85 PID 4104 wrote to memory of 4704 4104 rundll32.exe 85 PID 4104 wrote to memory of 4704 4104 rundll32.exe 85 PID 4104 wrote to memory of 4704 4104 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9613e0f2fb488663a79c2e6b9303dd80860408e6e466c19f048a43d350983179.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9613e0f2fb488663a79c2e6b9303dd80860408e6e466c19f048a43d350983179.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:404
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 6763⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4104 -ip 41041⤵PID:4304