Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
1096fcd872148014eb60b91a9775c4ef_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1096fcd872148014eb60b91a9775c4ef_JaffaCakes118.dll
-
Size
989KB
-
MD5
1096fcd872148014eb60b91a9775c4ef
-
SHA1
fb906fa1446b0379d3560255c1c1e710b1f52255
-
SHA256
f3b0395084b9f2b7a4a01141e120cba2a6418b5e0115c49f117f92644ccef6a9
-
SHA512
011ac98ebfa19fd70c7766fee7ca22915d1a922792cc91a7c6b4088072eca36119e0b2145d35b2c85c8f8efe730f721162b96f8de04908b7fd92c6463f945e45
-
SSDEEP
24576:5VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:5V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002D70000-0x0000000002D71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rekeywiz.exemsdtc.exerdpclip.exepid process 2448 rekeywiz.exe 2908 msdtc.exe 2748 rdpclip.exe -
Loads dropped DLL 7 IoCs
Processes:
rekeywiz.exemsdtc.exerdpclip.exepid process 1204 2448 rekeywiz.exe 1204 2908 msdtc.exe 1204 2748 rdpclip.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\TaskBar\\u4v7i\\msdtc.exe" -
Processes:
rundll32.exerekeywiz.exemsdtc.exerdpclip.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1800 rundll32.exe 1800 rundll32.exe 1800 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2460 1204 rekeywiz.exe PID 1204 wrote to memory of 2460 1204 rekeywiz.exe PID 1204 wrote to memory of 2460 1204 rekeywiz.exe PID 1204 wrote to memory of 2448 1204 rekeywiz.exe PID 1204 wrote to memory of 2448 1204 rekeywiz.exe PID 1204 wrote to memory of 2448 1204 rekeywiz.exe PID 1204 wrote to memory of 2972 1204 msdtc.exe PID 1204 wrote to memory of 2972 1204 msdtc.exe PID 1204 wrote to memory of 2972 1204 msdtc.exe PID 1204 wrote to memory of 2908 1204 msdtc.exe PID 1204 wrote to memory of 2908 1204 msdtc.exe PID 1204 wrote to memory of 2908 1204 msdtc.exe PID 1204 wrote to memory of 2736 1204 rdpclip.exe PID 1204 wrote to memory of 2736 1204 rdpclip.exe PID 1204 wrote to memory of 2736 1204 rdpclip.exe PID 1204 wrote to memory of 2748 1204 rdpclip.exe PID 1204 wrote to memory of 2748 1204 rdpclip.exe PID 1204 wrote to memory of 2748 1204 rdpclip.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1096fcd872148014eb60b91a9775c4ef_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:2460
-
C:\Users\Admin\AppData\Local\f8xkKM6s\rekeywiz.exeC:\Users\Admin\AppData\Local\f8xkKM6s\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2448
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:2972
-
C:\Users\Admin\AppData\Local\26IKd\msdtc.exeC:\Users\Admin\AppData\Local\26IKd\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2736
-
C:\Users\Admin\AppData\Local\SmW\rdpclip.exeC:\Users\Admin\AppData\Local\SmW\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD57d30b5d20f79803dfa6fb65266be1ffe
SHA1ad3b4ebbfbe2139198b17f3813a9b7300cdf62a0
SHA256ad787e930e5af071fa900dbaf8ee19f25cf50e4709dd8544bcdfbe15bb473d9a
SHA512fb62e94d35ea13fe5fb495cff9bf4373bdc68104b67be34acd9c544ef3b378ec93eff6ff67e8fdc241e19dd3ed5179d80ec17b3d311e2c115b8ee3987217da81
-
Filesize
991KB
MD58b9d2a3c40e005cc6c2cdf8b21f4b4a7
SHA1659a5dbd5f98eeaa807707fbd93acc84baea0061
SHA2563dee39c8d927254a7db59d1faa5143bf667c5b013e0639553bf248e571821a74
SHA512baa58772edcc288d2d89115e4313994ce93783f655257cdf7b668bd44ed080e6c2a7447ab64630c2e6f0663af947f9912ad24c9303dbfa2189f8c6d774c2761e
-
Filesize
991KB
MD5e9dba3342799754c114936541daced15
SHA1517cfca55c1e6af0e2414f202b2588cf6a7b1730
SHA256698b8b896204bf7ed50e550d3f5cd1e32ff45db9ff073ee0930d24ed809acaed
SHA51219dd54381618aa2f1fc919527546f99e08db6e1d711716500ed57f7419311dd661d32f64e84279bea8b2cd8fcacdb4b964a5c6c7d9cfb36f17438695585f2ec1
-
Filesize
921B
MD5ddb7353b7c350fbdc4fc50142b9510b6
SHA14c5cdc0c4902fcba8907111fdd53bc9ca7db6e8e
SHA256d7e564f724791a7a891b49f46b69cbd3b31c5522a567f564175d3a5b4b950ec2
SHA5124ac831025355693efa305e29625b0c4779bb333d20bc95c27a32a7313a5625a99de2c275b8776c13b0ade94896171a585037ce166770707c9cf2e86f0daf1fc7
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9