Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
fc32137f3e228e9e455fa2c02e9c4fc1_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
fc32137f3e228e9e455fa2c02e9c4fc1_JaffaCakes118.dll
-
Size
992KB
-
MD5
fc32137f3e228e9e455fa2c02e9c4fc1
-
SHA1
a806b54ea307a973eb90be2bfdf3548c289ea7a8
-
SHA256
1eba96e3896ac29a02e3ff731c18d2169387d537e61f4fb9878b3d4e9955dbb4
-
SHA512
a6d3f2dccaf18e723651b654c2053c3a3ddea3da3b22d43569c86581b3f020502fa3a37874764e2ef85468e6d13890aa33f41f98cfaf89802cd132875abcd44a
-
SSDEEP
12288:ldMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0TF0B1fhqq:rMIJxSDX3bqjhcfHk7MzH6zuzfhq
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1368-4-0x00000000029E0000-0x00000000029E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/3008-1-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral1/memory/1368-29-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral1/memory/1368-40-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral1/memory/1368-41-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral1/memory/3008-49-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral1/memory/2488-58-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload behavioral1/memory/2488-62-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload behavioral1/memory/1084-80-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload behavioral1/memory/1944-98-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
fveprompt.exeDWWIN.EXEsethc.exepid process 2488 fveprompt.exe 1084 DWWIN.EXE 1944 sethc.exe -
Loads dropped DLL 7 IoCs
Processes:
fveprompt.exeDWWIN.EXEsethc.exepid process 1368 2488 fveprompt.exe 1368 1084 DWWIN.EXE 1368 1944 sethc.exe 1368 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\rN0hfGr\\DWWIN.EXE" -
Processes:
rundll32.exefveprompt.exeDWWIN.EXEsethc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3008 rundll32.exe 3008 rundll32.exe 3008 rundll32.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1368 wrote to memory of 2444 1368 fveprompt.exe PID 1368 wrote to memory of 2444 1368 fveprompt.exe PID 1368 wrote to memory of 2444 1368 fveprompt.exe PID 1368 wrote to memory of 2488 1368 fveprompt.exe PID 1368 wrote to memory of 2488 1368 fveprompt.exe PID 1368 wrote to memory of 2488 1368 fveprompt.exe PID 1368 wrote to memory of 596 1368 DWWIN.EXE PID 1368 wrote to memory of 596 1368 DWWIN.EXE PID 1368 wrote to memory of 596 1368 DWWIN.EXE PID 1368 wrote to memory of 1084 1368 DWWIN.EXE PID 1368 wrote to memory of 1084 1368 DWWIN.EXE PID 1368 wrote to memory of 1084 1368 DWWIN.EXE PID 1368 wrote to memory of 1680 1368 sethc.exe PID 1368 wrote to memory of 1680 1368 sethc.exe PID 1368 wrote to memory of 1680 1368 sethc.exe PID 1368 wrote to memory of 1944 1368 sethc.exe PID 1368 wrote to memory of 1944 1368 sethc.exe PID 1368 wrote to memory of 1944 1368 sethc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc32137f3e228e9e455fa2c02e9c4fc1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:2444
-
C:\Users\Admin\AppData\Local\45K44T\fveprompt.exeC:\Users\Admin\AppData\Local\45K44T\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2488
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:596
-
C:\Users\Admin\AppData\Local\OjwH7\DWWIN.EXEC:\Users\Admin\AppData\Local\OjwH7\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1084
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:1680
-
C:\Users\Admin\AppData\Local\n38\sethc.exeC:\Users\Admin\AppData\Local\n38\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD509076283661a37e80d27893bf502f709
SHA11f7a239e2140acbeddab527b4ca0ab8cb6a75b92
SHA2562c816999011b11615088c21f8b8513d7ffc39913438e70b6e9d5ee31c7b015a7
SHA5129fced731e568a4a7d49766f0658b8c387297d567fe7a6e916aed64c4a5777190a0b8540f281c29392ba55a6c743b1ed5754c47e364283b4d65d6688852d38a19
-
Filesize
996KB
MD5cf74b83dbf9c1de14c7fcec2275b1982
SHA1a0dabba4e2544c95d22b21b2bffb463a6e78a126
SHA256428353189bf1e7fb9c811f06a18b6f744837c3d56cd1c8fcd980b15df7dc8224
SHA512fc62e611354a98b7cdc532c732c1160fb537436f9f3d04bf5df2f05c51f01b9ae621706ff86d0d5824fb0a040c73635a9fd39e4af010f771927f7d404880a94a
-
Filesize
996KB
MD58d7132fe00f3ee16895b9d519c9343c5
SHA10e8e9804d3db2df04f08f00b25279e41cacc81b0
SHA25605d135306120aa033a8bdc8c2b7b2589c77588d3f6ec0959c3cb4e5e9c6154ea
SHA5124fc8f053335e09bbf3d2f4c9ddfb9f3e98a6389bc0aa6a6e07ef7676688906e010f870adc221537233d1e40c1f88b4814c89d56490df2fef27fb1110c7d5f1d7
-
Filesize
1KB
MD5e1369826db9d2840a006032897b14176
SHA139c3d90024c11d7c4cf2a2bcdea8a0c4b21b996e
SHA2566d75393add394b475642be99e2fadbc8b84abfab2826f28541c35164ea0e1210
SHA512910fd568d82e8b4bd150c17bc18efdbc2ff3b96544f018d402c6263fd5c18a4889846e651d592ca7f9b7e9226b8b6f0dea87dfede7237b728d5f5906761843c6
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
Filesize
149KB
MD525247e3c4e7a7a73baeea6c0008952b1
SHA18087adb7a71a696139ddc5c5abc1a84f817ab688
SHA256c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050
SHA512bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df