Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll
-
Size
986KB
-
MD5
1a284e601d4b39b13a2c1ea67fe0433b
-
SHA1
396f1bbc283017fe8a3df5bd487d2731e7fe347f
-
SHA256
3b7790a2520c63e35ddae8ac5a3aed6c09b16a1a3506d414c6aedfc65cba9b34
-
SHA512
eb7ffe8c4f1da82e188214ed7af8ddd518afb30173cf058ac6ff54176f357fb95f629f36965342b5791dd5b85a82d5a9c8965866f480e356c4adba156f1d3386
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000003CA0000-0x0000000003CA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
icardagt.exewbengine.exetaskmgr.exepid process 2568 icardagt.exe 500 wbengine.exe 2812 taskmgr.exe -
Loads dropped DLL 7 IoCs
Processes:
icardagt.exewbengine.exetaskmgr.exepid process 1204 2568 icardagt.exe 1204 500 wbengine.exe 1204 2812 taskmgr.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\H7\\wbengine.exe" -
Processes:
rundll32.exeicardagt.exewbengine.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2060 rundll32.exe 2060 rundll32.exe 2060 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2520 1204 icardagt.exe PID 1204 wrote to memory of 2520 1204 icardagt.exe PID 1204 wrote to memory of 2520 1204 icardagt.exe PID 1204 wrote to memory of 2568 1204 icardagt.exe PID 1204 wrote to memory of 2568 1204 icardagt.exe PID 1204 wrote to memory of 2568 1204 icardagt.exe PID 1204 wrote to memory of 2288 1204 wbengine.exe PID 1204 wrote to memory of 2288 1204 wbengine.exe PID 1204 wrote to memory of 2288 1204 wbengine.exe PID 1204 wrote to memory of 500 1204 wbengine.exe PID 1204 wrote to memory of 500 1204 wbengine.exe PID 1204 wrote to memory of 500 1204 wbengine.exe PID 1204 wrote to memory of 2696 1204 taskmgr.exe PID 1204 wrote to memory of 2696 1204 taskmgr.exe PID 1204 wrote to memory of 2696 1204 taskmgr.exe PID 1204 wrote to memory of 2812 1204 taskmgr.exe PID 1204 wrote to memory of 2812 1204 taskmgr.exe PID 1204 wrote to memory of 2812 1204 taskmgr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a284e601d4b39b13a2c1ea67fe0433b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵
-
C:\Users\Admin\AppData\Local\saer\icardagt.exeC:\Users\Admin\AppData\Local\saer\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵
-
C:\Users\Admin\AppData\Local\uY1Ux\wbengine.exeC:\Users\Admin\AppData\Local\uY1Ux\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\taskmgr.exeC:\Windows\system32\taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\U1GT7oq\taskmgr.exeC:\Users\Admin\AppData\Local\U1GT7oq\taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\saer\VERSION.dllFilesize
986KB
MD58be573546ae6967fb6da27b05a6c6d9a
SHA1a80263920f6d7beb096159367d6425fedb7ec7a8
SHA25673650d7af752a6aae47ddd4b05cfd5075c51810d11cd638ddd132ac46382803c
SHA512660afdb2035cfcf871d7302148c2918f5ca83f5f5604f7f02596d7c324413599bcf308755dadda4c408814e43d8047094ebc29b43ae68a9594546bd89f2c2d55
-
C:\Users\Admin\AppData\Local\uY1Ux\wbengine.exeFilesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
1KB
MD507b3057fed334276e586bd5e7d4e2f15
SHA12f7a154d9fc5002d3d480260afabb60766b81ae6
SHA256f45e228c0660239ef1e854ed29d3f5095201178417ea3cdaac5da08e058d8b9a
SHA5125bd77d59f8b009a964bc74ab0d3e5be03d99d7de52f5b0761bc9054462b89e6e3f35f44951f63aeffffe644700387179d4f5ab904bdcc690834f88948bd335d7
-
\Users\Admin\AppData\Local\U1GT7oq\Secur32.dllFilesize
989KB
MD5d4155b71404c14f20881a5d034a6bfad
SHA134e8984f4a897fe6c5db78ad8ce3f3b2295b9a91
SHA2564e1b13043cfc10d1659d76d95758de1ac4282d8f3f6104ace7d01d9684ea4edf
SHA512e0d6fce0bf04954e8017b1e8e2ae4f483bb8987f1ac774cc399b20ebd3bf33484fe0b185bbd7319bd2081e2f015bef525407415f84ca4f9f688ad0da60aa90af
-
\Users\Admin\AppData\Local\U1GT7oq\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
\Users\Admin\AppData\Local\saer\icardagt.exeFilesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
\Users\Admin\AppData\Local\uY1Ux\XmlLite.dllFilesize
986KB
MD5e40436f61113c15f054d633473c44fc5
SHA1405d46fb002d9a793ff9550c89b12c96ec8f1a4e
SHA256d8a247fe416c22a1e1d294378b07569648b199b9f63ed5c741fdcd5618ab554d
SHA5122be38608b69fa0ab9bd11bce41e4a802a7f69a813bcb629344c2f9ff8a2e326be3a6f04f21eb2745c753c29792d1603c2ba23730d9785197c1740398f1f5fcaf
-
memory/500-74-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/500-76-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-26-0x0000000077AF0000-0x0000000077AF2000-memory.dmpFilesize
8KB
-
memory/1204-25-0x0000000077961000-0x0000000077962000-memory.dmpFilesize
4KB
-
memory/1204-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-39-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-4-0x0000000077856000-0x0000000077857000-memory.dmpFilesize
4KB
-
memory/1204-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-5-0x0000000003CA0000-0x0000000003CA1000-memory.dmpFilesize
4KB
-
memory/1204-73-0x0000000077856000-0x0000000077857000-memory.dmpFilesize
4KB
-
memory/1204-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-24-0x0000000002D10000-0x0000000002D17000-memory.dmpFilesize
28KB
-
memory/1204-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1204-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2060-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2060-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2060-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2568-58-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2568-55-0x0000000000200000-0x0000000000207000-memory.dmpFilesize
28KB
-
memory/2568-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2812-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB