Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
047d2f4724128d47aefb732f8c7edf86_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
047d2f4724128d47aefb732f8c7edf86_JaffaCakes118.dll
-
Size
989KB
-
MD5
047d2f4724128d47aefb732f8c7edf86
-
SHA1
46b3eb21a3661cc09940cfbba4541ff1442c7bd6
-
SHA256
7debe439df429d32f9038ce6bc1cf0d873d64273fbf1ca44df840bdb4bf60302
-
SHA512
2bc764f2dd39966507de9487c4cb8de0008920a26f5f3a98a6a1c2d16a9d34bef41a15978cf892b045d063f62be1742bbafa58607a3c233a1e14b56ed9fdbbff
-
SSDEEP
24576:3VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:3V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1396-5-0x0000000002A60000-0x0000000002A61000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DevicePairingWizard.exep2phost.exeSystemPropertiesAdvanced.exepid process 2372 DevicePairingWizard.exe 2856 p2phost.exe 812 SystemPropertiesAdvanced.exe -
Loads dropped DLL 7 IoCs
Processes:
DevicePairingWizard.exep2phost.exeSystemPropertiesAdvanced.exepid process 1396 2372 DevicePairingWizard.exe 1396 2856 p2phost.exe 1396 812 SystemPropertiesAdvanced.exe 1396 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\OHJOM9~1\\p2phost.exe" -
Processes:
rundll32.exeDevicePairingWizard.exep2phost.exeSystemPropertiesAdvanced.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p2phost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1396 wrote to memory of 1540 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 1540 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 1540 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 2372 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 2372 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 2372 1396 DevicePairingWizard.exe PID 1396 wrote to memory of 2800 1396 p2phost.exe PID 1396 wrote to memory of 2800 1396 p2phost.exe PID 1396 wrote to memory of 2800 1396 p2phost.exe PID 1396 wrote to memory of 2856 1396 p2phost.exe PID 1396 wrote to memory of 2856 1396 p2phost.exe PID 1396 wrote to memory of 2856 1396 p2phost.exe PID 1396 wrote to memory of 760 1396 SystemPropertiesAdvanced.exe PID 1396 wrote to memory of 760 1396 SystemPropertiesAdvanced.exe PID 1396 wrote to memory of 760 1396 SystemPropertiesAdvanced.exe PID 1396 wrote to memory of 812 1396 SystemPropertiesAdvanced.exe PID 1396 wrote to memory of 812 1396 SystemPropertiesAdvanced.exe PID 1396 wrote to memory of 812 1396 SystemPropertiesAdvanced.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\047d2f4724128d47aefb732f8c7edf86_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:1540
-
C:\Users\Admin\AppData\Local\WluvIkE\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\WluvIkE\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2372
-
C:\Windows\system32\p2phost.exeC:\Windows\system32\p2phost.exe1⤵PID:2800
-
C:\Users\Admin\AppData\Local\ne6mh\p2phost.exeC:\Users\Admin\AppData\Local\ne6mh\p2phost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2856
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:760
-
C:\Users\Admin\AppData\Local\URfkRpB0\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\URfkRpB0\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
989KB
MD5288e47962b7c7308737ca7054c862313
SHA1c840d71820fb09cad4bb73302572db2c406d8a9d
SHA25665ba4253ac42e3e5afcf56d11df942bb1a321cb3999a65b30b8dc0ef1f9a4a1a
SHA512f5fc37316fdf367e96ab4ce309e80b8d466b1df4485ba41cf0cee70455a26e4d7b85c41454dd1b624ccc3cc9b9e2947016d34172379be50b1f77fd5e12c64847
-
Filesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
Filesize
993KB
MD5dbca1609af043a7f85032c733fe9d769
SHA1a11decdd788f17385f2cffd0dd1b0e6c02d549cf
SHA2566b1c7dddfe67194141acb06f9f39be1a299551e9190387ba8eb287d65eb3798c
SHA51223dd83c8fa523fd7210958d9a96dbb5f0a52e684808f05a84da172a50c032631ce490ad09667d0849b6591af2a676ba7b968e294f7ac72bbc38250dcdeddab67
-
Filesize
1KB
MD592d60db1d09c894368315be341492f5f
SHA13b975e73659908a940766b47ee0ef03d0b3ca90a
SHA2561a1f7a7840b55add78d124bdd63c7763698ac40018f226ccc095a7908499bbab
SHA5129e57ea3d85ba54150c928f34ebcdcac83ef7266c183210a3cafa3fe4e70ad537d5fb9bc195f6a8ca2655e6924d0d6cf4a03397676dca54bd790558419eee4e9a
-
Filesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
Filesize
1016KB
MD59128689fd5798b20d7c3518589fed61e
SHA1a9d152469839f5312ab10d16cab34fcf2b6d89d0
SHA256e43faa2823a7b39ce3f93cbbcf14db979e7a7cf085fd859e34481a29c03319bb
SHA512d87cd4de4af1289d4f5b39ab6f8ad299a090d83b849b1e83bdc9942a50c82d32870387a177192475a03fb5bc0aba6f3ef558ee14be1740aa78c7d77b38cd5ec3
-
Filesize
172KB
MD50dbd420477352b278dfdc24f4672b79c
SHA1df446f25be33ac60371557717073249a64e04bb2
SHA2561baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345
SHA51284014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1