Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
f5bdf9e867392a9fdd068bc4b5193e01_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f5bdf9e867392a9fdd068bc4b5193e01_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f5bdf9e867392a9fdd068bc4b5193e01_JaffaCakes118.dll
-
Size
1.7MB
-
MD5
f5bdf9e867392a9fdd068bc4b5193e01
-
SHA1
2d78042993f6369a0cfeba80c85fce40c046617f
-
SHA256
f989c27ef773e62ae146234b5b26601b7f4db4b87abc476dc13efceecbea46af
-
SHA512
10bc1b07b6d7013c3a524738c25983b057b229434199d0feecfca6f17672c0bbf759edc89d7f2c297003d475e919bb00ab954083df7c6ea1e4779660bb8843bd
-
SSDEEP
12288:7VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:afP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1356-5-0x0000000002A80000-0x0000000002A81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpinit.exeraserver.exeDevicePairingWizard.exepid process 2556 rdpinit.exe 1508 raserver.exe 2768 DevicePairingWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpinit.exeraserver.exeDevicePairingWizard.exepid process 1356 2556 rdpinit.exe 1356 1508 raserver.exe 1356 2768 DevicePairingWizard.exe 1356 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Groztcac = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\Z4aXBQi\\raserver.exe" -
Processes:
raserver.exeDevicePairingWizard.exerundll32.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2196 rundll32.exe 2196 rundll32.exe 2196 rundll32.exe 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1356 wrote to memory of 2976 1356 rdpinit.exe PID 1356 wrote to memory of 2976 1356 rdpinit.exe PID 1356 wrote to memory of 2976 1356 rdpinit.exe PID 1356 wrote to memory of 2556 1356 rdpinit.exe PID 1356 wrote to memory of 2556 1356 rdpinit.exe PID 1356 wrote to memory of 2556 1356 rdpinit.exe PID 1356 wrote to memory of 2724 1356 raserver.exe PID 1356 wrote to memory of 2724 1356 raserver.exe PID 1356 wrote to memory of 2724 1356 raserver.exe PID 1356 wrote to memory of 1508 1356 raserver.exe PID 1356 wrote to memory of 1508 1356 raserver.exe PID 1356 wrote to memory of 1508 1356 raserver.exe PID 1356 wrote to memory of 2692 1356 DevicePairingWizard.exe PID 1356 wrote to memory of 2692 1356 DevicePairingWizard.exe PID 1356 wrote to memory of 2692 1356 DevicePairingWizard.exe PID 1356 wrote to memory of 2768 1356 DevicePairingWizard.exe PID 1356 wrote to memory of 2768 1356 DevicePairingWizard.exe PID 1356 wrote to memory of 2768 1356 DevicePairingWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5bdf9e867392a9fdd068bc4b5193e01_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵
-
C:\Users\Admin\AppData\Local\6DaiAg\rdpinit.exeC:\Users\Admin\AppData\Local\6DaiAg\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\Es4vX1\raserver.exeC:\Users\Admin\AppData\Local\Es4vX1\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\qVMOb\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\qVMOb\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6DaiAg\WTSAPI32.dllFilesize
1.7MB
MD5710a762d1a6973d9c7770c99bcc5312c
SHA11ea4d21581e38a8fc910a742b651cd2f010af49d
SHA256ddf11c2c469df8aff64473473820ba44a70fe7f51dd72a809972af4989ce304e
SHA512c9e5325f6cd8de94ec7e418544c186aa4d68e7f809caa91d2d7319993b0cd41a89b01b7722b114e137a914f9853b9850ab51f31a6fa4992428333dc3545542fb
-
C:\Users\Admin\AppData\Local\qVMOb\MFC42u.dllFilesize
1.7MB
MD54a5efdf5f5d7d613ee7319b536244b06
SHA17b83f9d7b1823452698c7166866c022d01643dc0
SHA256ca96ed52d8433bc0a435957d11e00656840652867b5df289d0473e422c2cf97f
SHA51285013128e76cdeb17584bc37b43d44cc093aa42edd144c513f33085e27abaee7ead867efe17199172a93b10d1360752b5198dd39b7643177c5478e666b970e5f
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aqrvnhd.lnkFilesize
1KB
MD59f4825b8effd2d4f31bd154d4eb16ceb
SHA13b91cc389825eaea461288bddd2b20593a5907af
SHA2564cf1fdbf1b6d381d65f6997156ffad18e45a5add528e0a7c375bbcb89c1833dc
SHA5127cacc30af387716d51be6fe570b6cfcb6a0329d1d91cf69587aebac798ec710da485dd32bccada4662b84e5cb704c7f48e2a683d5c909227924a3d9ad7ec0a60
-
\Users\Admin\AppData\Local\6DaiAg\rdpinit.exeFilesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
\Users\Admin\AppData\Local\Es4vX1\WTSAPI32.dllFilesize
1.7MB
MD56a185dc09513c58cd27598de02286971
SHA19d40e43f7839f80e2274caafc88c1673b1f30a93
SHA2563835c873e9bc33ce37de7464a7220306e8a368e63445d83296ef79601bb5eafb
SHA5120c2ca9fa471dcb68268267d1713f16402b7ab65e9c26031cf5aa336605224c50408d7b0c0290c5be4324794ac309ec30e70fae0df15b452d7661368616216c15
-
\Users\Admin\AppData\Local\Es4vX1\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\qVMOb\DevicePairingWizard.exeFilesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
memory/1356-17-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-11-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-26-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-28-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-30-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-32-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-34-0x0000000002A60000-0x0000000002A67000-memory.dmpFilesize
28KB
-
memory/1356-31-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-29-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-40-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-27-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-25-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-24-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-42-0x00000000779A0000-0x00000000779A2000-memory.dmpFilesize
8KB
-
memory/1356-41-0x0000000077841000-0x0000000077842000-memory.dmpFilesize
4KB
-
memory/1356-22-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-21-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-20-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-18-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-129-0x0000000077636000-0x0000000077637000-memory.dmpFilesize
4KB
-
memory/1356-15-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-14-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-12-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-23-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-10-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-8-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-4-0x0000000077636000-0x0000000077637000-memory.dmpFilesize
4KB
-
memory/1356-51-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-54-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-19-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-16-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-5-0x0000000002A80000-0x0000000002A81000-memory.dmpFilesize
4KB
-
memory/1356-60-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-9-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1356-13-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/1508-93-0x0000000140000000-0x00000001401A9000-memory.dmpFilesize
1.7MB
-
memory/1508-90-0x0000000000380000-0x0000000000387000-memory.dmpFilesize
28KB
-
memory/2196-7-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/2196-0-0x0000000140000000-0x00000001401A8000-memory.dmpFilesize
1.7MB
-
memory/2196-1-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2556-75-0x0000000140000000-0x00000001401A9000-memory.dmpFilesize
1.7MB
-
memory/2556-70-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2556-69-0x0000000140000000-0x00000001401A9000-memory.dmpFilesize
1.7MB
-
memory/2768-105-0x0000000140000000-0x00000001401AF000-memory.dmpFilesize
1.7MB
-
memory/2768-110-0x0000000140000000-0x00000001401AF000-memory.dmpFilesize
1.7MB