Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
1d19acd154bf1676f07c6ca4ade6d4d6
-
SHA1
ebbf27f296de3c89a58021d31e054204698ab477
-
SHA256
46041e5c693d0750c1d45de49962be9a767692f56c79ead576198d48ca0ed5d5
-
SHA512
1dcb97135d50c4e6ddf243473883440ad34537fd54aae72929e7a1c4d57c1e301400ccd2c4c870e127bee8be69052b796f3a222b9bc4f41c73b033cb80f4f210
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002510000-0x0000000002511000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
osk.exeSystemPropertiesHardware.exeSystemPropertiesComputerName.exepid process 2660 osk.exe 3000 SystemPropertiesHardware.exe 3016 SystemPropertiesComputerName.exe -
Loads dropped DLL 7 IoCs
Processes:
osk.exeSystemPropertiesHardware.exeSystemPropertiesComputerName.exepid process 1192 2660 osk.exe 1192 3000 SystemPropertiesHardware.exe 1192 3016 SystemPropertiesComputerName.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\YNz4ERW23eG\\SystemPropertiesHardware.exe" -
Processes:
rundll32.exeosk.exeSystemPropertiesHardware.exeSystemPropertiesComputerName.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2888 rundll32.exe 2888 rundll32.exe 2888 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2564 1192 osk.exe PID 1192 wrote to memory of 2564 1192 osk.exe PID 1192 wrote to memory of 2564 1192 osk.exe PID 1192 wrote to memory of 2660 1192 osk.exe PID 1192 wrote to memory of 2660 1192 osk.exe PID 1192 wrote to memory of 2660 1192 osk.exe PID 1192 wrote to memory of 1152 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 1152 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 1152 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 3000 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 3000 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 3000 1192 SystemPropertiesHardware.exe PID 1192 wrote to memory of 2992 1192 SystemPropertiesComputerName.exe PID 1192 wrote to memory of 2992 1192 SystemPropertiesComputerName.exe PID 1192 wrote to memory of 2992 1192 SystemPropertiesComputerName.exe PID 1192 wrote to memory of 3016 1192 SystemPropertiesComputerName.exe PID 1192 wrote to memory of 3016 1192 SystemPropertiesComputerName.exe PID 1192 wrote to memory of 3016 1192 SystemPropertiesComputerName.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d19acd154bf1676f07c6ca4ade6d4d6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\rEpfd\osk.exeC:\Users\Admin\AppData\Local\rEpfd\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\Fh7h9D\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\Fh7h9D\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\e1Ee\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\e1Ee\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Fh7h9D\SYSDM.CPLFilesize
1.2MB
MD5b38d46e264f8734174d1613c3d0d7f40
SHA17852b62dc51b05002b5e432dc7feb6adf05ed9cb
SHA2564c048506f0394b69c6ae8b07becd45f94c32e56578d7d6928fbf735a856e4919
SHA512d7fa879847507090f78ea0d90c08c77a6f684aee07d9d8f5ff7c4fd11e2afcc30fb2be7ad03dded5d2d5b7639c16032a2a8996307fb8c64b5d858e2cf175cb92
-
C:\Users\Admin\AppData\Local\e1Ee\SYSDM.CPLFilesize
1.2MB
MD5441a4f93d357064e71c6ecb9e4d08831
SHA197193533dde299b3da83bc7994114d86beefce75
SHA25656128620769e3a6b765fedbd321a15db277d78553c773c31cc99534a25ca01d7
SHA5125dd9fdf06dd106148e2d09a7d002a99c1e5b39e5e0fbbf10c6adee74cfc7b9a859216c2ef2093b2b234cdb77ea44204f86f1bf477b090b28d9dcb850a2928683
-
C:\Users\Admin\AppData\Local\rEpfd\WMsgAPI.dllFilesize
1.2MB
MD511523253d83da1d3cbd744e803c4fec5
SHA13748e0c6a834e642aa88bef90d73cc186cc88990
SHA256706ab2c9a40d8aa8e35e09ed924b910a8e81367c108e3422c447bc17c1bd2639
SHA5122b47bdc621ac0e9b8edc65f18b29364ba24c2ae33f6652d134917c1e091549f00aa9e6943a9ef5829d4ef7e76db9afc0b8fbc9283f5b6b4b629378eb0ce0ef93
-
C:\Users\Admin\AppData\Local\rEpfd\osk.exeFilesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
1KB
MD59dd323706c587b65e04872b97a2f9430
SHA188b108169c519d9bc0bd63a09a750ccbd36b9b8f
SHA2562368629a63c868f731133a4710a12e0f5942d10a188f9d57374ed17df12a77ed
SHA512595d1ce3745bd929f6aaead861441b40f03766a94a8d39cbd2fa9196831d6f96406cca5ccfcedda70049340f152ea9e7f24d8e4150a91a3363fe9583e1ee8924
-
\Users\Admin\AppData\Local\Fh7h9D\SystemPropertiesHardware.exeFilesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Local\e1Ee\SystemPropertiesComputerName.exeFilesize
80KB
MD5bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
memory/1192-9-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-65-0x0000000076DF6000-0x0000000076DF7000-memory.dmpFilesize
4KB
-
memory/1192-25-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-14-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-13-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-27-0x0000000076F01000-0x0000000076F02000-memory.dmpFilesize
4KB
-
memory/1192-12-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-11-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-10-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-4-0x0000000076DF6000-0x0000000076DF7000-memory.dmpFilesize
4KB
-
memory/1192-28-0x0000000077090000-0x0000000077092000-memory.dmpFilesize
8KB
-
memory/1192-38-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-37-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-5-0x0000000002510000-0x0000000002511000-memory.dmpFilesize
4KB
-
memory/1192-26-0x00000000024F0000-0x00000000024F7000-memory.dmpFilesize
28KB
-
memory/1192-16-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-8-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-7-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1192-15-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2660-60-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2660-54-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2660-57-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2888-46-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2888-0-0x00000000003A0000-0x00000000003A7000-memory.dmpFilesize
28KB
-
memory/2888-1-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/3000-73-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/3000-79-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/3016-96-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB