Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e63ce51454cfbd2471d012bc28183358385dd6b7e7adab4657e7d6d9b8689bc0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_e63ce51454cfbd2471d012bc28183358385dd6b7e7adab4657e7d6d9b8689bc0.dll
-
Size
440KB
-
MD5
0c1b8a46c7e22ac2de1b14c62106e5b0
-
SHA1
1c25ad7ef991839d7be43af13c391370f8d1f208
-
SHA256
e63ce51454cfbd2471d012bc28183358385dd6b7e7adab4657e7d6d9b8689bc0
-
SHA512
c063f4ee6fde4db928830bad22a05a310d70f4dbe5e9822aee6c88a7366f1963b8bad787543d8e6b6dbac8c58b5c57ccd52933cf4d3a4fc3d636ff67f91fab42
-
SSDEEP
6144:v5+iRFTkRhO9SEhtZtfherliYSuTNpBRaj4gzaxCdKJjWJFWMaDTX3H:JFTk4tZTm4EBpL0zacMScx7
Malware Config
Extracted
trickbot
100019
rob141
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2488 2972 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 864 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2972 4892 rundll32.exe 82 PID 4892 wrote to memory of 2972 4892 rundll32.exe 82 PID 4892 wrote to memory of 2972 4892 rundll32.exe 82 PID 2972 wrote to memory of 4960 2972 rundll32.exe 83 PID 2972 wrote to memory of 4960 2972 rundll32.exe 83 PID 2972 wrote to memory of 4960 2972 rundll32.exe 83 PID 2972 wrote to memory of 864 2972 rundll32.exe 84 PID 2972 wrote to memory of 864 2972 rundll32.exe 84 PID 2972 wrote to memory of 864 2972 rundll32.exe 84 PID 2972 wrote to memory of 864 2972 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e63ce51454cfbd2471d012bc28183358385dd6b7e7adab4657e7d6d9b8689bc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e63ce51454cfbd2471d012bc28183358385dd6b7e7adab4657e7d6d9b8689bc0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:4960
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 6643⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 29721⤵PID:2220