Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
f1a67e05914164352d275e66cccaf7bb_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1a67e05914164352d275e66cccaf7bb_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
f1a67e05914164352d275e66cccaf7bb_JaffaCakes118.dll
-
Size
1.8MB
-
MD5
f1a67e05914164352d275e66cccaf7bb
-
SHA1
14e733c9a5377403784b6d76e5f47a726792d46c
-
SHA256
0ca6eeb34b2c72f00949a770e57661c268118f3b6482018be4dd6c6a1fd07719
-
SHA512
ab13de1f87b73136b73360f7adb5349982f92e5a084005250d62c0555289fde65a34fa34f33e62cbf220864ab737c519208413bebf998057af409e5d62b62fa7
-
SSDEEP
12288:yVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:vfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1264-5-0x0000000002220000-0x0000000002221000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wisptis.exeslui.execttune.exepid process 2496 wisptis.exe 840 slui.exe 2836 cttune.exe -
Loads dropped DLL 7 IoCs
Processes:
wisptis.exeslui.execttune.exepid process 1264 2496 wisptis.exe 1264 840 slui.exe 1264 2836 cttune.exe 1264 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\eLwNK\\slui.exe" -
Processes:
rundll32.exewisptis.exeslui.execttune.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1728 rundll32.exe 1728 rundll32.exe 1728 rundll32.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1264 wrote to memory of 2456 1264 wisptis.exe PID 1264 wrote to memory of 2456 1264 wisptis.exe PID 1264 wrote to memory of 2456 1264 wisptis.exe PID 1264 wrote to memory of 2496 1264 wisptis.exe PID 1264 wrote to memory of 2496 1264 wisptis.exe PID 1264 wrote to memory of 2496 1264 wisptis.exe PID 1264 wrote to memory of 1148 1264 slui.exe PID 1264 wrote to memory of 1148 1264 slui.exe PID 1264 wrote to memory of 1148 1264 slui.exe PID 1264 wrote to memory of 840 1264 slui.exe PID 1264 wrote to memory of 840 1264 slui.exe PID 1264 wrote to memory of 840 1264 slui.exe PID 1264 wrote to memory of 2764 1264 cttune.exe PID 1264 wrote to memory of 2764 1264 cttune.exe PID 1264 wrote to memory of 2764 1264 cttune.exe PID 1264 wrote to memory of 2836 1264 cttune.exe PID 1264 wrote to memory of 2836 1264 cttune.exe PID 1264 wrote to memory of 2836 1264 cttune.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1a67e05914164352d275e66cccaf7bb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵
-
C:\Users\Admin\AppData\Local\dx3mInmww\wisptis.exeC:\Users\Admin\AppData\Local\dx3mInmww\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵
-
C:\Users\Admin\AppData\Local\SYL3B\slui.exeC:\Users\Admin\AppData\Local\SYL3B\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵
-
C:\Users\Admin\AppData\Local\b2K\cttune.exeC:\Users\Admin\AppData\Local\b2K\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\b2K\OLEACC.dllFilesize
1.8MB
MD53a5377ef226d414132e4bee68ce26039
SHA10a635bbf8741f9a751d36b17cafc9dfe647f765e
SHA256467f28ea9826d4d3b56a646a3e01b972014e472795ff199718fa0cb627a12b01
SHA512b6417def2b72c8d31456b7b724162cb4ee200ec7c4a05ff2b14c5905939f1910a095c5e7815f87b3153900bb140e90b62222043dbf1761ffefef4dff0681d431
-
C:\Users\Admin\AppData\Local\dx3mInmww\WTSAPI32.dllFilesize
1.8MB
MD56c63fde341afd03590ffe734613f6f6d
SHA1ae836935d16de0cbca4b508f423f19ef45b5f712
SHA256fde9c0c8e221929411841a15f348d0be8a3a7e5e6886af5a90f0140fd6db3509
SHA512ae9165580443f2487a5a2252ba1aab6426341bc65729212e1cfe2b468a7c5bb53c0b46c5d00654651e440895c4b3edc9d3da64581564176a81417d1bbd917624
-
C:\Users\Admin\AppData\Local\dx3mInmww\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD566b3edf23d4ce9b76b427b41ce612585
SHA19c1be7840e82592666748ba61df91ebabb955a2d
SHA256d9e7c5af97c95a28ffd8d3efbb7e137bbfc39750fb431c911cbdceae6ab1533a
SHA5129d879ee65b9db92d3df107cdfcbb6c5b48347cc921a51b26d136210dbd5fddbc0577f14437383536c4d4d483fc68dcd404015026e84e878bc315310a5040ef9e
-
\Users\Admin\AppData\Local\SYL3B\WINBRAND.dllFilesize
1.8MB
MD585f5b48293a9c57e03464dd02bc8a119
SHA11c96749f4899e3f65628dca4173cd4cadd2a84ac
SHA256c7bf5a05d7b8a775e0f702e600282816a867b49330422682849b70a755bcba14
SHA512a02c7f445dab2c758d3df23d3361145bcb7d9f2423ef576815776c773164bd1cd31086ec79cce9d2028167132ddb2fda9328b80e1d0a9acb7030c1bacd7c5d4c
-
\Users\Admin\AppData\Local\SYL3B\slui.exeFilesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
\Users\Admin\AppData\Local\b2K\cttune.exeFilesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
memory/840-100-0x00000000001C0000-0x00000000001C7000-memory.dmpFilesize
28KB
-
memory/1264-36-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-42-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-17-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-16-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-18-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-22-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-21-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-20-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-19-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-23-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-33-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-32-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-31-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-30-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-29-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-28-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-27-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-26-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-25-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-24-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-35-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-34-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-4-0x0000000076B46000-0x0000000076B47000-memory.dmpFilesize
4KB
-
memory/1264-40-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-39-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-38-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-37-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-11-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-43-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-41-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-44-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-46-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-45-0x00000000021F0000-0x00000000021F7000-memory.dmpFilesize
28KB
-
memory/1264-53-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-55-0x0000000076EB0000-0x0000000076EB2000-memory.dmpFilesize
8KB
-
memory/1264-54-0x0000000076D51000-0x0000000076D52000-memory.dmpFilesize
4KB
-
memory/1264-64-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-70-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-69-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-74-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-12-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-13-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-5-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/1264-142-0x0000000076B46000-0x0000000076B47000-memory.dmpFilesize
4KB
-
memory/1264-10-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-9-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-7-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-14-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1264-15-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1728-8-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/1728-1-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/1728-0-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/2496-82-0x0000000140000000-0x00000001401C2000-memory.dmpFilesize
1.8MB
-
memory/2496-83-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2836-120-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB