Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
0c2f2c5053a1aeca9442fe7a94a12d90_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
0c2f2c5053a1aeca9442fe7a94a12d90_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
0c2f2c5053a1aeca9442fe7a94a12d90
-
SHA1
4472a3f7d0837f108a94c1e85f66a4ee59862e80
-
SHA256
998ad9f4b08ca563f76ec2e50176bfcfd2d3eee637baa90216664644618204ab
-
SHA512
dda17f58b7be7fb21602fc3073713a5fbf29dcf086e428f610f11afc856789691ffb84c0e393a01f12b918164658c4aa4ba92baa3e680af39ca2bc183551b76c
-
SSDEEP
24576:NuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:H9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1360-5-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dvdupgrd.exemblctr.exedccw.exepid process 2480 dvdupgrd.exe 2936 mblctr.exe 2916 dccw.exe -
Loads dropped DLL 7 IoCs
Processes:
dvdupgrd.exemblctr.exedccw.exepid process 1360 2480 dvdupgrd.exe 1360 2936 mblctr.exe 1360 2916 dccw.exe 1360 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Groztcac = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\mgdjLkip\\mblctr.exe" -
Processes:
rundll32.exedvdupgrd.exemblctr.exedccw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1360 wrote to memory of 2488 1360 dvdupgrd.exe PID 1360 wrote to memory of 2488 1360 dvdupgrd.exe PID 1360 wrote to memory of 2488 1360 dvdupgrd.exe PID 1360 wrote to memory of 2480 1360 dvdupgrd.exe PID 1360 wrote to memory of 2480 1360 dvdupgrd.exe PID 1360 wrote to memory of 2480 1360 dvdupgrd.exe PID 1360 wrote to memory of 1984 1360 mblctr.exe PID 1360 wrote to memory of 1984 1360 mblctr.exe PID 1360 wrote to memory of 1984 1360 mblctr.exe PID 1360 wrote to memory of 2936 1360 mblctr.exe PID 1360 wrote to memory of 2936 1360 mblctr.exe PID 1360 wrote to memory of 2936 1360 mblctr.exe PID 1360 wrote to memory of 2748 1360 dccw.exe PID 1360 wrote to memory of 2748 1360 dccw.exe PID 1360 wrote to memory of 2748 1360 dccw.exe PID 1360 wrote to memory of 2916 1360 dccw.exe PID 1360 wrote to memory of 2916 1360 dccw.exe PID 1360 wrote to memory of 2916 1360 dccw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c2f2c5053a1aeca9442fe7a94a12d90_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵
-
C:\Users\Admin\AppData\Local\9IBL2N8c\dvdupgrd.exeC:\Users\Admin\AppData\Local\9IBL2N8c\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\eUZFU6k5\mblctr.exeC:\Users\Admin\AppData\Local\eUZFU6k5\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵
-
C:\Users\Admin\AppData\Local\UVrE\dccw.exeC:\Users\Admin\AppData\Local\UVrE\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9IBL2N8c\VERSION.dllFilesize
1.2MB
MD5d15e96cdd34c02e680989869cd73da24
SHA11b6c39c4c04838f8eb2f43c7f5bc67729ef15245
SHA256ffd28014a7b0c01c6a06e0aed5776a26267cb98eb6a4f4ec1e9494da2106475a
SHA5122528d12c325c48ec4a4335b851690542e954289495e855bd922c6e12795f6e03c1800697d612cd68c48a17ddb760d83ed3ad46ec69d064d0b840f5f8b61abeb4
-
C:\Users\Admin\AppData\Local\9IBL2N8c\dvdupgrd.exeFilesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
C:\Users\Admin\AppData\Local\UVrE\mscms.dllFilesize
1.2MB
MD5cd4e6dd5685a9116fbaba437ac2e694c
SHA10d9fb51bb2f5f72ac88092826d96747ebe2fe5be
SHA256818cb04a98208f08f296ccc52f70f0ef3f597241e46da4b4edfc34ff2f17a606
SHA51286d134eb9ad55479ad5930abe2e19030f0011f0a0458194d4d85d66d365d8aac1d06338cc35e1520eb3c0809fc7064bddb66a3ccddcd3b5914590f79b154ce85
-
C:\Users\Admin\AppData\Local\eUZFU6k5\WTSAPI32.dllFilesize
1.2MB
MD5d54034eebe7011687c9aaf1b8155a98e
SHA14937a2bcfc4af95f660f3ce9167514760b406d7a
SHA256c18c9422a0a8d61b54bb929b5eb3742973909ec07cea69be8c68d4079f8ef91b
SHA512331ebdfda60ab6873e881bd8c7056c27a58597bb6d85d2267650bbd33c1b1bf6a97ba39ea616067ac94ddc33bdbd10bfac9ee8f03da0d9d2be677d25b1cca2a3
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aqrvnhd.lnkFilesize
1KB
MD5a2e6c581202cbf094b0de7844b43d9c1
SHA1cbdd0996b335b9edcaa5aa67be101279d1fcdf7d
SHA25693d39a12445c512b20429f85ce533aa2827ab3d79d002b8bf33d7a9e45c06af0
SHA512808d296620a2b44d46e0a070f81565e4ddbaace96d41a5857e336ba3c7ec42891d3773e873abab1b203f9cc9f904d9654f823f0d5707a16e656eee0e793f93dd
-
\Users\Admin\AppData\Local\UVrE\dccw.exeFilesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
\Users\Admin\AppData\Local\eUZFU6k5\mblctr.exeFilesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
memory/1360-27-0x0000000002590000-0x0000000002597000-memory.dmpFilesize
28KB
-
memory/1360-8-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-9-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-29-0x0000000077450000-0x0000000077452000-memory.dmpFilesize
8KB
-
memory/1360-28-0x00000000772C1000-0x00000000772C2000-memory.dmpFilesize
4KB
-
memory/1360-18-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-17-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-15-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-14-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-13-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-10-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-4-0x00000000770B6000-0x00000000770B7000-memory.dmpFilesize
4KB
-
memory/1360-26-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-35-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-34-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-5-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/1360-11-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-12-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-72-0x00000000770B6000-0x00000000770B7000-memory.dmpFilesize
4KB
-
memory/1360-16-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1360-7-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1420-43-0x000007FEF5ED0000-0x000007FEF6011000-memory.dmpFilesize
1.3MB
-
memory/1420-1-0x000007FEF5ED0000-0x000007FEF6011000-memory.dmpFilesize
1.3MB
-
memory/1420-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2480-57-0x000007FEF6950000-0x000007FEF6A92000-memory.dmpFilesize
1.3MB
-
memory/2480-54-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2480-51-0x000007FEF6950000-0x000007FEF6A92000-memory.dmpFilesize
1.3MB
-
memory/2916-87-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2916-93-0x000007FEF5ED0000-0x000007FEF6012000-memory.dmpFilesize
1.3MB
-
memory/2936-69-0x000007FEF5ED0000-0x000007FEF6012000-memory.dmpFilesize
1.3MB
-
memory/2936-75-0x000007FEF5ED0000-0x000007FEF6012000-memory.dmpFilesize
1.3MB