Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 06:38
Static task
static1
Behavioral task
behavioral1
Sample
166efc8a667e3cfb33844e03296e97eb_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
166efc8a667e3cfb33844e03296e97eb_JaffaCakes118.dll
-
Size
986KB
-
MD5
166efc8a667e3cfb33844e03296e97eb
-
SHA1
bd5d5ea491654f42528d67a181b1f2cc69a13ce1
-
SHA256
9a5fafe9f2709e56150afa4f94b4a157fd75ae0cbd85f3df661c912278392f7a
-
SHA512
05124728e76803ccf20dcdbd3c3ba39f62b535997c9f5129a03fe8adf7b7f0b441d7402905728fd133a1a93fe7a7b4d152da242892564dc567abd95d4dd08a6e
-
SSDEEP
24576:PVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:PV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002090000-0x0000000002091000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wscript.exerdpclip.exemspaint.exepid process 2552 wscript.exe 2616 rdpclip.exe 2276 mspaint.exe -
Loads dropped DLL 8 IoCs
Processes:
wscript.exerdpclip.exemspaint.exepid process 1192 1192 2552 wscript.exe 1192 2616 rdpclip.exe 1192 2276 mspaint.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\Collab\\TmyY\\rdpclip.exe" -
Processes:
rundll32.exewscript.exerdpclip.exemspaint.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2644 1192 wscript.exe PID 1192 wrote to memory of 2644 1192 wscript.exe PID 1192 wrote to memory of 2644 1192 wscript.exe PID 1192 wrote to memory of 2552 1192 wscript.exe PID 1192 wrote to memory of 2552 1192 wscript.exe PID 1192 wrote to memory of 2552 1192 wscript.exe PID 1192 wrote to memory of 1776 1192 rdpclip.exe PID 1192 wrote to memory of 1776 1192 rdpclip.exe PID 1192 wrote to memory of 1776 1192 rdpclip.exe PID 1192 wrote to memory of 2616 1192 rdpclip.exe PID 1192 wrote to memory of 2616 1192 rdpclip.exe PID 1192 wrote to memory of 2616 1192 rdpclip.exe PID 1192 wrote to memory of 1236 1192 mspaint.exe PID 1192 wrote to memory of 1236 1192 mspaint.exe PID 1192 wrote to memory of 1236 1192 mspaint.exe PID 1192 wrote to memory of 2276 1192 mspaint.exe PID 1192 wrote to memory of 2276 1192 mspaint.exe PID 1192 wrote to memory of 2276 1192 mspaint.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\166efc8a667e3cfb33844e03296e97eb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\HnET\wscript.exeC:\Users\Admin\AppData\Local\HnET\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵
-
C:\Users\Admin\AppData\Local\Vk4z\rdpclip.exeC:\Users\Admin\AppData\Local\Vk4z\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵
-
C:\Users\Admin\AppData\Local\kExB9etsz\mspaint.exeC:\Users\Admin\AppData\Local\kExB9etsz\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\HnET\VERSION.dllFilesize
987KB
MD5845ae88336e50a2c9b0e22674b82bece
SHA19b4fb9f2e15f73a7fc7c896feae419596da4e42c
SHA25668719f84581c7c6bde21a47ad55faaa256cb0a7274a9b5b08471f5d4b4bb9a13
SHA512c9b6a1697bc22d558732cc0c76eadba1b656ad03e81e0bed71ecf8316fbb78e95c6dc309687782ce135fcc7625bcddd93033ee9e262ef6cd4bc618cf404cb8ba
-
C:\Users\Admin\AppData\Local\Vk4z\WTSAPI32.dllFilesize
988KB
MD58c7a92c5693bb7d94ab807ac453f9f3b
SHA1081530604352d41b776945d1377c60ecf41fb965
SHA256effcf4005d32f0c61b8e636168292c4a35deef9b4bfc7d0e599d8e22365d87aa
SHA5129e79d5bf0b797f77896f178c0c666e7ef3e797e42c6bfe653014c7da22ddd0a4ad31033f294c76df70bf16a30cd1bea43367e5494ed67a0cd562043ef504e4af
-
C:\Users\Admin\AppData\Local\kExB9etsz\MFC42u.dllFilesize
1014KB
MD568d9198471ef04026ef891625a9dfc42
SHA1fc3a161ddc58623ed69fcf45dbbc490c4bd7d779
SHA25645dcace3d1b02d41e0b2aaa458bc381e0546ef521aa4cb39dc5d2ffd94dc62c4
SHA512ded190acae77113a4f06b74b1ac45ed7dcb1e31c77864e271d5d2fe79cb80302a420870b29db8e7c83ffdf46a1ad0f5b14342d96f415c4cdfa17eb7836b70bab
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
1KB
MD5f278e2641852572841a9f66b259d387b
SHA12a463f8eefe23508ab4b4e9981c19929f1d585d0
SHA25613b4e0cc768de59c349545f8c6b5bd4812516af1938a68d346a75b70e148bd4f
SHA512f55a2c9c1194ce0632688ab57eaf55b9778124a09ff407504d8536dfc64c445078032c54d2f48bfc78f2618961d71d5e4389a5221c28054b60cd8b0987aa145a
-
\Users\Admin\AppData\Local\HnET\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\Vk4z\rdpclip.exeFilesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
\Users\Admin\AppData\Local\kExB9etsz\mspaint.exeFilesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681
-
memory/1192-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-25-0x0000000077691000-0x0000000077692000-memory.dmpFilesize
4KB
-
memory/1192-24-0x0000000002070000-0x0000000002077000-memory.dmpFilesize
28KB
-
memory/1192-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-4-0x0000000077586000-0x0000000077587000-memory.dmpFilesize
4KB
-
memory/1192-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-5-0x0000000002090000-0x0000000002091000-memory.dmpFilesize
4KB
-
memory/1192-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-28-0x0000000077820000-0x0000000077822000-memory.dmpFilesize
8KB
-
memory/1192-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-66-0x0000000077586000-0x0000000077587000-memory.dmpFilesize
4KB
-
memory/2276-95-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2276-92-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/2276-97-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/2552-61-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2552-55-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2552-58-0x00000000003E0000-0x00000000003E7000-memory.dmpFilesize
28KB
-
memory/2616-77-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2616-80-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2992-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2992-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2992-3-0x00000000001B0000-0x00000000001B7000-memory.dmpFilesize
28KB