Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
036e3859b663301f666bc11f9655bc86_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
036e3859b663301f666bc11f9655bc86_JaffaCakes118.dll
-
Size
989KB
-
MD5
036e3859b663301f666bc11f9655bc86
-
SHA1
e1442aa7e7415fda529f1ed0d4845558d00354f7
-
SHA256
729d4b47c771bb857a969a80d6fb82302896584a8c0a69fdcd6171489365008f
-
SHA512
b1d001e641959a11195726aa12f2f4b810867ad003dd0eeb9c55a3479b1ae7e15b9e3142a2713abf758d3e5f7f20326af77d31cf5b573d28a62373513d945b50
-
SSDEEP
24576:JVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:JV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1176-5-0x0000000002E30000-0x0000000002E31000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
PresentationSettings.exemsdtc.exeSystemPropertiesRemote.exepid process 2428 PresentationSettings.exe 2704 msdtc.exe 1496 SystemPropertiesRemote.exe -
Loads dropped DLL 7 IoCs
Processes:
PresentationSettings.exemsdtc.exeSystemPropertiesRemote.exepid process 1176 2428 PresentationSettings.exe 1176 2704 msdtc.exe 1176 1496 SystemPropertiesRemote.exe 1176 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Javhf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\9H3xR0JpD\\msdtc.exe" -
Processes:
rundll32.exePresentationSettings.exemsdtc.exeSystemPropertiesRemote.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1968 rundll32.exe 1968 rundll32.exe 1968 rundll32.exe 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1176 wrote to memory of 2412 1176 PresentationSettings.exe PID 1176 wrote to memory of 2412 1176 PresentationSettings.exe PID 1176 wrote to memory of 2412 1176 PresentationSettings.exe PID 1176 wrote to memory of 2428 1176 PresentationSettings.exe PID 1176 wrote to memory of 2428 1176 PresentationSettings.exe PID 1176 wrote to memory of 2428 1176 PresentationSettings.exe PID 1176 wrote to memory of 2708 1176 msdtc.exe PID 1176 wrote to memory of 2708 1176 msdtc.exe PID 1176 wrote to memory of 2708 1176 msdtc.exe PID 1176 wrote to memory of 2704 1176 msdtc.exe PID 1176 wrote to memory of 2704 1176 msdtc.exe PID 1176 wrote to memory of 2704 1176 msdtc.exe PID 1176 wrote to memory of 1368 1176 SystemPropertiesRemote.exe PID 1176 wrote to memory of 1368 1176 SystemPropertiesRemote.exe PID 1176 wrote to memory of 1368 1176 SystemPropertiesRemote.exe PID 1176 wrote to memory of 1496 1176 SystemPropertiesRemote.exe PID 1176 wrote to memory of 1496 1176 SystemPropertiesRemote.exe PID 1176 wrote to memory of 1496 1176 SystemPropertiesRemote.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\036e3859b663301f666bc11f9655bc86_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵
-
C:\Users\Admin\AppData\Local\g5w3CmkM\PresentationSettings.exeC:\Users\Admin\AppData\Local\g5w3CmkM\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\GSQNr\msdtc.exeC:\Users\Admin\AppData\Local\GSQNr\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\RkT0\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\RkT0\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GSQNr\VERSION.dllFilesize
990KB
MD5a95669b93c95736cf7b4fb25dda16ef4
SHA1f7eb698563940b7c94f82c652bd78cff8af70f3f
SHA256e16614bd2fd0f55562629a7e1ae4190e5001be6496a7d69f6e46f83488362c21
SHA512c5a1e51c6f37e9d14738ca4864e65ac8e0bcd456ab43eb5d20f327d305ad3f3338fe3fee1f7096a3056a465b883bc280f93d959161e9cf88312b2cd4461125f3
-
C:\Users\Admin\AppData\Local\RkT0\SYSDM.CPLFilesize
990KB
MD5030ba8e86f34b2495869500d0aa64c6f
SHA115eefe7036d8bd0cda386acdbb6442cebd2844a2
SHA256ca396a4d7e05157fceb6e3217b0aecbee6e72e5a118591b36905de9456736b32
SHA5122647774fcaae3dd9f9ddb8f8db35fc810b5a9bc84e0d295c0648e82b3f4e38d4cf54ab07ed2ff16ec645d9dee5391011c439638e940caad49865dca331549402
-
C:\Users\Admin\AppData\Local\g5w3CmkM\WINMM.dllFilesize
994KB
MD5ba6327ff71f90bb5a1576b53ebafcafa
SHA14fc622a96e2b8ddb07a145718dd178aa58e373f8
SHA2568c4b0e3cb770339551a871a02c51d990141b7f1010a276023a0ed1ad178ee32a
SHA51283ab48c744623d3490e0ca42d7933cc9e23fc77382c1982de5d723e5b3d377d0407cd14cd4b196a8a1c4f19eed1b89e1308d76c4039703600cfc858547ca8dbf
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xwtifesqpwfy.lnkFilesize
1KB
MD5810f27f203d3a7e5a2d528aa65777f00
SHA1962419d826fff038d7f8bd896461abfdd3220e2b
SHA2563b032ce497222b01e980baf4edf7034dcb4ea9943b04be2a9e83725b6333544a
SHA5126d6ba3ff2c6594be260b2d8e767a9b32e460a8a2c907bf0b0c447c27da418c59940124e2036d36e73453ba38cabc72129ba47e175b23d28b5a13333706d55065
-
\Users\Admin\AppData\Local\GSQNr\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\RkT0\SystemPropertiesRemote.exeFilesize
80KB
MD5d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
\Users\Admin\AppData\Local\g5w3CmkM\PresentationSettings.exeFilesize
172KB
MD5a6f8d318f6041334889481b472000081
SHA1b8cf08ec17b30c8811f2514246fcdff62731dd58
SHA256208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258
SHA51260f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69
-
memory/1176-26-0x0000000077040000-0x0000000077042000-memory.dmpFilesize
8KB
-
memory/1176-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-25-0x0000000076EB1000-0x0000000076EB2000-memory.dmpFilesize
4KB
-
memory/1176-24-0x0000000002E40000-0x0000000002E47000-memory.dmpFilesize
28KB
-
memory/1176-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-4-0x0000000076DA6000-0x0000000076DA7000-memory.dmpFilesize
4KB
-
memory/1176-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-5-0x0000000002E30000-0x0000000002E31000-memory.dmpFilesize
4KB
-
memory/1176-70-0x0000000076DA6000-0x0000000076DA7000-memory.dmpFilesize
4KB
-
memory/1176-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1176-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1496-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1968-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1968-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1968-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2428-58-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2428-55-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2428-52-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2704-71-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2704-72-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2704-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB