Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
07a15ed8751def5bbf538964fbf993b0_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
07a15ed8751def5bbf538964fbf993b0_JaffaCakes118.dll
-
Size
990KB
-
MD5
07a15ed8751def5bbf538964fbf993b0
-
SHA1
a04388f19678f0a1991115224a6a2e7c669d3a90
-
SHA256
59d9e70834bb6d70b2174b5d11706ecb7cea61f4ab905c986aa98448edc76367
-
SHA512
00d92eb16d19ba3994fa0b72a98e636d3cc929386d98657e7b73bf532412f9e12ece449379190bb0251cf4b62d5a1b6147294776c206c434942fd16c52c7a20c
-
SSDEEP
24576:pVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:pV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1152-5-0x0000000002E90000-0x0000000002E91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wextract.exeperfmon.exedialer.exepid process 2576 wextract.exe 884 perfmon.exe 2716 dialer.exe -
Loads dropped DLL 7 IoCs
Processes:
wextract.exeperfmon.exedialer.exepid process 1152 2576 wextract.exe 1152 884 perfmon.exe 1152 2716 dialer.exe 1152 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\9ftKAfrV5QY\\perfmon.exe" -
Processes:
rundll32.exewextract.exeperfmon.exedialer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1152 wrote to memory of 2764 1152 wextract.exe PID 1152 wrote to memory of 2764 1152 wextract.exe PID 1152 wrote to memory of 2764 1152 wextract.exe PID 1152 wrote to memory of 2576 1152 wextract.exe PID 1152 wrote to memory of 2576 1152 wextract.exe PID 1152 wrote to memory of 2576 1152 wextract.exe PID 1152 wrote to memory of 2920 1152 perfmon.exe PID 1152 wrote to memory of 2920 1152 perfmon.exe PID 1152 wrote to memory of 2920 1152 perfmon.exe PID 1152 wrote to memory of 884 1152 perfmon.exe PID 1152 wrote to memory of 884 1152 perfmon.exe PID 1152 wrote to memory of 884 1152 perfmon.exe PID 1152 wrote to memory of 2532 1152 dialer.exe PID 1152 wrote to memory of 2532 1152 dialer.exe PID 1152 wrote to memory of 2532 1152 dialer.exe PID 1152 wrote to memory of 2716 1152 dialer.exe PID 1152 wrote to memory of 2716 1152 dialer.exe PID 1152 wrote to memory of 2716 1152 dialer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a15ed8751def5bbf538964fbf993b0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:2764
-
C:\Users\Admin\AppData\Local\wgUk\wextract.exeC:\Users\Admin\AppData\Local\wgUk\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2576
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2920
-
C:\Users\Admin\AppData\Local\uJhPf10E\perfmon.exeC:\Users\Admin\AppData\Local\uJhPf10E\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:884
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:2532
-
C:\Users\Admin\AppData\Local\GaBJ\dialer.exeC:\Users\Admin\AppData\Local\GaBJ\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GaBJ\TAPI32.dllFilesize
998KB
MD584f736b403a405412756a08fbdd449ab
SHA13647ff5a1eea874105e84606aa5f428b635b23b5
SHA256585755afe3d8bd95dc4bbe5cf8a7e74977a02d27f89979ab4b5a37394b00686c
SHA512a518aee0be31d21c4a717bbde77f2f334886ef959fe1b408f8ca432104ca5dbdce81e0e367374278e84a4d290fe2898768ce072a696e478fb2ba614673d1bdb1
-
C:\Users\Admin\AppData\Local\uJhPf10E\Secur32.dllFilesize
993KB
MD5a9f4c42b1e6d4b31a05fa44110007645
SHA12ad6a8d119bb7e81ca8cc582918fe7b092753650
SHA256f4c3f95ea62325e27943e9086ceb605c02f5fc82c159f3a358912a7f3c3f7bb6
SHA51228e5a8a9a826cf4083121653be33341c803f90633eef3a2fe360d90905e86d0f9a412ac96c52e9f70e2eeab8d38b81f68a544104b8bf2bf7040bcfc6048aa83d
-
C:\Users\Admin\AppData\Local\wgUk\VERSION.dllFilesize
990KB
MD528b1decda01f309b5f149cc663483637
SHA1a26695c6f18a645289d53091a17ac9fdd4b4db1c
SHA2563f024f22e92f477de43e4505cf9e2fbda8dbda388d76cc392f374457332b622d
SHA512ed0bcf465221fbb20664f4671624dae60ac6af28f3449fb6b07e2e4b0dc1891b32a6d6781f3247932cd0cf7a51c23edb67a3c22f8448b01d007c7c5e40f79ffb
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
947B
MD544087bc317363c9e8194cbf0bcbe0de0
SHA10bbc51ae9f0f6cd07ba088c7ee65976cfdccecc0
SHA256dae5a3c48add2b4e5b8f2b333a774a930d4ba4fd393c2446c1e87f262895b282
SHA512a8e5c0b02674b95508f04420cb36b4fcfa42079b353a4942da02176aa7c3b09f7927b3aea7e5882e0584f02e2aab595763d9483eb45fdcd09ed8729ce488dfaa
-
\Users\Admin\AppData\Local\GaBJ\dialer.exeFilesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
\Users\Admin\AppData\Local\uJhPf10E\perfmon.exeFilesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
\Users\Admin\AppData\Local\wgUk\wextract.exeFilesize
140KB
MD51ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
memory/884-74-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/884-71-0x00000000002B0000-0x00000000002B7000-memory.dmpFilesize
28KB
-
memory/1152-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-70-0x0000000076CD6000-0x0000000076CD7000-memory.dmpFilesize
4KB
-
memory/1152-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-27-0x0000000076F70000-0x0000000076F72000-memory.dmpFilesize
8KB
-
memory/1152-26-0x0000000076DE1000-0x0000000076DE2000-memory.dmpFilesize
4KB
-
memory/1152-25-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-32-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-33-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-4-0x0000000076CD6000-0x0000000076CD7000-memory.dmpFilesize
4KB
-
memory/1152-5-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/1152-16-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-15-0x0000000002DF0000-0x0000000002DF7000-memory.dmpFilesize
28KB
-
memory/2576-53-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2576-52-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/2576-49-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2716-86-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2716-89-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2716-92-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/3020-0-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3020-41-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/3020-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB