Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
14424e927320cb758b2c314ebe1df889
-
SHA1
1f20dd2472d5684b850b991ce30714ecf8a3b9d1
-
SHA256
b23b7277f4aa14f76a34accc9c26a18714be7e1601ca8c19c195d0b8251cf96d
-
SHA512
717aa863b1935aec5e50025bc90aeb580f905b74019060ca3960f11c4ffe2a5f8ec1a2086ea8a19297696f68519b714cb4e94b53486b8b6fcd160e1076d04055
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x00000000025D0000-0x00000000025D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
vmicsvc.exeWindowsAnytimeUpgradeResults.exeDxpserver.exepid process 2740 vmicsvc.exe 1912 WindowsAnytimeUpgradeResults.exe 2912 Dxpserver.exe -
Loads dropped DLL 7 IoCs
Processes:
vmicsvc.exeWindowsAnytimeUpgradeResults.exeDxpserver.exepid process 1196 2740 vmicsvc.exe 1196 1912 WindowsAnytimeUpgradeResults.exe 1196 2912 Dxpserver.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\SYSTEM~1\\iWMpp\\WINDOW~1.EXE" -
Processes:
Dxpserver.exerundll32.exevmicsvc.exeWindowsAnytimeUpgradeResults.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3008 rundll32.exe 3008 rundll32.exe 3008 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 3020 1196 vmicsvc.exe PID 1196 wrote to memory of 3020 1196 vmicsvc.exe PID 1196 wrote to memory of 3020 1196 vmicsvc.exe PID 1196 wrote to memory of 2740 1196 vmicsvc.exe PID 1196 wrote to memory of 2740 1196 vmicsvc.exe PID 1196 wrote to memory of 2740 1196 vmicsvc.exe PID 1196 wrote to memory of 2992 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2992 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2992 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 1912 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 1912 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 1912 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2956 1196 Dxpserver.exe PID 1196 wrote to memory of 2956 1196 Dxpserver.exe PID 1196 wrote to memory of 2956 1196 Dxpserver.exe PID 1196 wrote to memory of 2912 1196 Dxpserver.exe PID 1196 wrote to memory of 2912 1196 Dxpserver.exe PID 1196 wrote to memory of 2912 1196 Dxpserver.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵
-
C:\Users\Admin\AppData\Local\GO1d3\vmicsvc.exeC:\Users\Admin\AppData\Local\GO1d3\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵
-
C:\Users\Admin\AppData\Local\EdcmhpPVn\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\EdcmhpPVn\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵
-
C:\Users\Admin\AppData\Local\9H1yWC6R\Dxpserver.exeC:\Users\Admin\AppData\Local\9H1yWC6R\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9H1yWC6R\XmlLite.dllFilesize
1.2MB
MD50146980d1cff6478d148584fe8ad0d67
SHA17430b62692a5b17e26264b945567da6fc58205a3
SHA256868c4f887537538adc6199c2a1fa918dfdc351579e8525c27dc04f70ecd9b2da
SHA512a8f26e786602641fa70f4438b91bbaef7c64a8197286ea4f1682bc2989e01b31d6f9acfa5cfae35267b1736c79c120b48aeab014340ea74072e8d2887c484236
-
C:\Users\Admin\AppData\Local\EdcmhpPVn\UxTheme.dllFilesize
1.2MB
MD56a5a5dc515a062719d867f15285c83ea
SHA1cc51cda33d897dee488c51823a033dad1b6537e5
SHA256f203f39d1e056362b34e4569a58802b98f88885d0268e585d4bd17b9e7d53498
SHA5123bf88c34fff3cde7cf63b7b4e6cbe81a11196e85d9e3d9dd5725fab2c1891e6d01c58f8ec7aba6922b28a07847915d11adecf0fb494bb10de3e91e1cc87f4a35
-
C:\Users\Admin\AppData\Local\GO1d3\ACTIVEDS.dllFilesize
1.2MB
MD5672b2bc2c73a83c1acd182960d2952e6
SHA1f2254e27f37d48a4a95b17c03116e367462966b4
SHA256a808b4c3ace70b605a90df973d61bb5f460299797512db0654dce5ba9a59027a
SHA5126360e07f04d23e6772779208b4cb7af1985e5d7ebc9e0d494bba832ccdd1875cd24d29d56d42f7037050dc7c62f17029176b2e7044a547405a6de51a08518dfd
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
1KB
MD5f4767a951c6126d6c25d3e2f2f60dfd5
SHA1a6db18caabc386f6c1b4455eba0da977e4354bcf
SHA2565878c105e903fd12cd62a51e4ddb83553f6301e6d6e110671a14b24b29dc1a0e
SHA512d395dfec603e2fddd4d7fd3f2e881f7a78903f9c56b93596b6c0a47bbaff9b7650c94a1256088fa480ce307d3aff2703197e848f82139f4b5cbab027b6f86b48
-
\Users\Admin\AppData\Local\9H1yWC6R\Dxpserver.exeFilesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
\Users\Admin\AppData\Local\EdcmhpPVn\WindowsAnytimeUpgradeResults.exeFilesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
\Users\Admin\AppData\Local\GO1d3\vmicsvc.exeFilesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
memory/1196-8-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-12-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-28-0x0000000077311000-0x0000000077312000-memory.dmpFilesize
4KB
-
memory/1196-17-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-16-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-15-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-14-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-13-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-11-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-10-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-9-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-4-0x0000000077206000-0x0000000077207000-memory.dmpFilesize
4KB
-
memory/1196-29-0x00000000774A0000-0x00000000774A2000-memory.dmpFilesize
8KB
-
memory/1196-39-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-38-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-5-0x00000000025D0000-0x00000000025D1000-memory.dmpFilesize
4KB
-
memory/1196-27-0x00000000025B0000-0x00000000025B7000-memory.dmpFilesize
28KB
-
memory/1196-26-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-7-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-18-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1196-66-0x0000000077206000-0x0000000077207000-memory.dmpFilesize
4KB
-
memory/1912-74-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/1912-75-0x000007FEF5F90000-0x000007FEF60D2000-memory.dmpFilesize
1.3MB
-
memory/1912-80-0x000007FEF5F90000-0x000007FEF60D2000-memory.dmpFilesize
1.3MB
-
memory/2740-61-0x000007FEF6A30000-0x000007FEF6B72000-memory.dmpFilesize
1.3MB
-
memory/2740-58-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/2740-55-0x000007FEF6A30000-0x000007FEF6B72000-memory.dmpFilesize
1.3MB
-
memory/2912-95-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2912-98-0x000007FEF5F90000-0x000007FEF60D2000-memory.dmpFilesize
1.3MB
-
memory/3008-47-0x000007FEF5F90000-0x000007FEF60D1000-memory.dmpFilesize
1.3MB
-
memory/3008-0-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/3008-1-0x000007FEF5F90000-0x000007FEF60D1000-memory.dmpFilesize
1.3MB