Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll
-
Size
2.0MB
-
MD5
fc4b33a58a3e5a3d9e79c705f1c4684b
-
SHA1
7e51a8e6a888eef2018cf6877f715ef75e3f4edb
-
SHA256
339daa6caefda7397da9e0e67e855cacb27afed32537c22bd975e3352f340513
-
SHA512
f2ae2697d3b2def9b98fc1a1a9dfe9522befc6b53b477b851f846ac089ea73a354fa9012e4236856608f725d8b18728a2e16d3bdfdbc2007d78443ecb8dbe8fe
-
SSDEEP
12288:MVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:5fP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1284-5-0x0000000002A10000-0x0000000002A11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wusa.exeSystemPropertiesHardware.exerdrleakdiag.exepid process 2844 wusa.exe 2224 SystemPropertiesHardware.exe 2496 rdrleakdiag.exe -
Loads dropped DLL 7 IoCs
Processes:
wusa.exeSystemPropertiesHardware.exerdrleakdiag.exepid process 1284 2844 wusa.exe 1284 2224 SystemPropertiesHardware.exe 1284 2496 rdrleakdiag.exe 1284 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\8Fdt78\\SystemPropertiesHardware.exe" -
Processes:
wusa.exeSystemPropertiesHardware.exerdrleakdiag.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdrleakdiag.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1368 regsvr32.exe 1368 regsvr32.exe 1368 regsvr32.exe 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1284 wrote to memory of 2904 1284 wusa.exe PID 1284 wrote to memory of 2904 1284 wusa.exe PID 1284 wrote to memory of 2904 1284 wusa.exe PID 1284 wrote to memory of 2844 1284 wusa.exe PID 1284 wrote to memory of 2844 1284 wusa.exe PID 1284 wrote to memory of 2844 1284 wusa.exe PID 1284 wrote to memory of 636 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 636 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 636 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 2224 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 2224 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 2224 1284 SystemPropertiesHardware.exe PID 1284 wrote to memory of 2600 1284 rdrleakdiag.exe PID 1284 wrote to memory of 2600 1284 rdrleakdiag.exe PID 1284 wrote to memory of 2600 1284 rdrleakdiag.exe PID 1284 wrote to memory of 2496 1284 rdrleakdiag.exe PID 1284 wrote to memory of 2496 1284 rdrleakdiag.exe PID 1284 wrote to memory of 2496 1284 rdrleakdiag.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:2904
-
C:\Users\Admin\AppData\Local\8JvPGxxKU\wusa.exeC:\Users\Admin\AppData\Local\8JvPGxxKU\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2844
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:636
-
C:\Users\Admin\AppData\Local\xH9\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\xH9\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2224
-
C:\Windows\system32\rdrleakdiag.exeC:\Windows\system32\rdrleakdiag.exe1⤵PID:2600
-
C:\Users\Admin\AppData\Local\97h\rdrleakdiag.exeC:\Users\Admin\AppData\Local\97h\rdrleakdiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5dc436923cbf87c39ff33bf5c8d814993
SHA1751c848998a551c4397521e39a337ed5fad3a5dd
SHA256acaa2a01f1d4ad3e283077b0a5d91049e1f2df7493921735afb48502f43f691d
SHA512af4c2f722f0ed51045976ca5ae95780e7e3dfdabb97301457880fd91c3f92fab8a9c07a35595eb3539a06dd1a0e227c97b9bc47865a6c624db4ec1e2d157c162
-
Filesize
300KB
MD5c15b3d813f4382ade98f1892350f21c7
SHA1a45c5abc6751bc8b9041e5e07923fa4fc1b4542b
SHA2568f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3
SHA5126d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c
-
Filesize
2.0MB
MD5a4795ea2758f42e8a897516184aacbd0
SHA1450a9c20124b6ea3793f4cc458a06b2ae853c222
SHA256b8a2594ea28e4dc4da46ba5e0a13e5e71eb4250d0a677ff9c08da5248244f6da
SHA5124dd8746845e189562e2d780319c7567088dd9687364e1566c3a991e3298ff1dbafdc65076361b7cf56df81a4febc082960b61cd16f4703ec3204516ee4298d8c
-
Filesize
2.0MB
MD56b625f7384dc3ebcdb4480534b58c998
SHA104273523007680b7e63d6ff84a5de9ebd9508a10
SHA256b8a5da8ed2c5002e099c717c014f457603429ec1cfc6b9ab5dc39af394d221b3
SHA512f9fa4e04fd49fa635962303067102970a139bcd6d329647e4d1f410c3ed5dc1de1b509bbfe4b101cb249155425e5c28177dad2b757ae69b24163f35d3808a170
-
Filesize
1KB
MD556e6791d0d37f35ab0571776c9b7da2e
SHA1bc0142a4799ba047e4f5621ce3c61e56cf4fb9d2
SHA2567a1c06c99168e783d5459533fd96c09a885b48abb6c4001088b6498d27719722
SHA51209389dac95b06b93fbb561ad79458c4332e757716c5659cd46960f9af87d195b73ca3081ca1bc0adccb12435683511acf9b27376404e74133d618113115d5dbe
-
Filesize
39KB
MD55e058566af53848541fa23fba4bb5b81
SHA1769ce3bfc45e4d56ed01dbeeeca7be22f9b9eed6
SHA256ae83b050fa722da7e4b19fc3d534f0126b1ec055643bb1f267b85b55160f4409
SHA512352029cf0af7583a4c525cfd1da7467446bac410a885b2768d8052f39577ccce85b21d5bd946be6bf8341e7308c8e4f645e4d79232b93aaf6a92d6cd55f598d0
-
Filesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be