Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll
-
Size
987KB
-
MD5
1ac433a51896469ce8de0c2112476c6b
-
SHA1
5c865ccaac2a42edeeca9faa7928a8b578fc95d5
-
SHA256
de768935312e545c65bc8eb1f91461fb2729fcb0517af6efdbdca5c9b6cb6c66
-
SHA512
112a8ba84ca41f00c0fe649b70453f07851a973ec018488fab0ec5e57bc28378f4c520ea607e31f8251163cfa8a6c69b7d2352609ab0d917a7d4319f07aef4d4
-
SSDEEP
24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:6V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1144-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exerrinstaller.exeraserver.exepid process 2652 tabcal.exe 1604 rrinstaller.exe 2672 raserver.exe -
Loads dropped DLL 7 IoCs
Processes:
tabcal.exerrinstaller.exeraserver.exepid process 1144 2652 tabcal.exe 1144 1604 rrinstaller.exe 1144 2672 raserver.exe 1144 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\9IrGNGm\\rrinstaller.exe" -
Processes:
tabcal.exerrinstaller.exeraserver.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1948 regsvr32.exe 1948 regsvr32.exe 1948 regsvr32.exe 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1144 wrote to memory of 2548 1144 tabcal.exe PID 1144 wrote to memory of 2548 1144 tabcal.exe PID 1144 wrote to memory of 2548 1144 tabcal.exe PID 1144 wrote to memory of 2652 1144 tabcal.exe PID 1144 wrote to memory of 2652 1144 tabcal.exe PID 1144 wrote to memory of 2652 1144 tabcal.exe PID 1144 wrote to memory of 1716 1144 rrinstaller.exe PID 1144 wrote to memory of 1716 1144 rrinstaller.exe PID 1144 wrote to memory of 1716 1144 rrinstaller.exe PID 1144 wrote to memory of 1604 1144 rrinstaller.exe PID 1144 wrote to memory of 1604 1144 rrinstaller.exe PID 1144 wrote to memory of 1604 1144 rrinstaller.exe PID 1144 wrote to memory of 2376 1144 raserver.exe PID 1144 wrote to memory of 2376 1144 raserver.exe PID 1144 wrote to memory of 2376 1144 raserver.exe PID 1144 wrote to memory of 2672 1144 raserver.exe PID 1144 wrote to memory of 2672 1144 raserver.exe PID 1144 wrote to memory of 2672 1144 raserver.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1ac433a51896469ce8de0c2112476c6b_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵
-
C:\Users\Admin\AppData\Local\cDH73Dvs\tabcal.exeC:\Users\Admin\AppData\Local\cDH73Dvs\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\HMd\rrinstaller.exeC:\Users\Admin\AppData\Local\HMd\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\vVdfK\raserver.exeC:\Users\Admin\AppData\Local\vVdfK\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\HMd\MFPlat.DLLFilesize
993KB
MD59f2b4d55d2b6c419b07ffffca81422e0
SHA1c6b88f540b3627820367bc54b5bf337ed212deb6
SHA256ef3b6d5c02262fe3954de8e81f9eb9edf56292d5e06e1edbcb5c7c9e7ac35617
SHA512b24781f48a8901388f3f6b1759d6d40f5473e4123c739e9f426a02b21b98fe491b5bbaabba23cdeba2ec9629ba2ce78ceeef0c22fb599c37077bffd5a4365ce0
-
C:\Users\Admin\AppData\Local\cDH73Dvs\HID.DLLFilesize
989KB
MD5a7e2326941bdcc53f64a3b02bc565237
SHA1603d9ec08b7720f16f02ee6f46e24f28f1ca00a9
SHA2567a50e6143b2700eb60a27a757567ec5700455d065ceca0bd63213a5309d20561
SHA512e77eb7e62ee292045195d7e99860a441693710e328eb7d3516eabbd156c238f4bc7de84c0459a826938d17c3772eb139e0d718dc31e6e523d5aa6c639a003c5e
-
C:\Users\Admin\AppData\Local\vVdfK\WTSAPI32.dllFilesize
989KB
MD5b51b35c43397841ba00e0aaabc648b0c
SHA12ce7aab8686ebc5a4fbb52bb4e1eb0e8c67e8758
SHA2560c09c1b9cdb75a56f7af50a42a3af9cabb8a44221daade9fe0cf71fe9b24261c
SHA512b2aec65ffd489210b63d31e936321cfdc246448e8143a15b7f9f922b9debd4e8ef5077f06eed7dec99ee976d1377e87cbaadb5dd55a651713b02631e3d481577
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
1KB
MD5208ffd0167a44fb3248a1a1e9aed1a2f
SHA13cbe15be39991c388e1159e15997221fa700cb6b
SHA256742923d2bb2eecc147bd51ceb8a242f462b1deb62ee43e1c4acb989a7bec651d
SHA512358c5ccb1e1bfba2a57a11f312bb35631f7e68647663c4320c6ea63560278957ced881107faf41ff792ffb571aa424ba6829c3d579248a8eb3f72ff478a894ce
-
\Users\Admin\AppData\Local\HMd\rrinstaller.exeFilesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
\Users\Admin\AppData\Local\cDH73Dvs\tabcal.exeFilesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
\Users\Admin\AppData\Local\vVdfK\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
memory/1144-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-24-0x0000000002DB0000-0x0000000002DB7000-memory.dmpFilesize
28KB
-
memory/1144-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-26-0x00000000778A0000-0x00000000778A2000-memory.dmpFilesize
8KB
-
memory/1144-25-0x0000000077711000-0x0000000077712000-memory.dmpFilesize
4KB
-
memory/1144-37-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-4-0x0000000077506000-0x0000000077507000-memory.dmpFilesize
4KB
-
memory/1144-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmpFilesize
4KB
-
memory/1144-73-0x0000000077506000-0x0000000077507000-memory.dmpFilesize
4KB
-
memory/1144-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1604-70-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1604-74-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/1604-75-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1948-3-0x00000000002C0000-0x00000000002C7000-memory.dmpFilesize
28KB
-
memory/1948-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1948-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2652-58-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2652-53-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2652-52-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2672-87-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2672-93-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB