Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll
-
Size
986KB
-
MD5
1eeb67c0b2313b3e4bc8acd49939c136
-
SHA1
e94a3953ad29be223a423514e0fe230c65999e04
-
SHA256
bcaa8df8f923d15444b1f1e63808c8b39ca0ac30d6c1288c294b5273f1a95387
-
SHA512
b57a8252fd821cad9ea48f431ceb20da7a6be24530459096a5998e7cb16559372fd8942e54a64ebadd58e2765e843024e808bfe32eec5897c42c92caaa9e1533
-
SSDEEP
24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1376-5-0x0000000002970000-0x0000000002971000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
raserver.exeDxpserver.exeNetplwiz.exepid process 2476 raserver.exe 2796 Dxpserver.exe 2508 Netplwiz.exe -
Loads dropped DLL 7 IoCs
Processes:
raserver.exeDxpserver.exeNetplwiz.exepid process 1376 2476 raserver.exe 1376 2796 Dxpserver.exe 1376 2508 Netplwiz.exe 1376 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Groztcac = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\5OKWAF~1\\DXPSER~1.EXE" -
Processes:
raserver.exeDxpserver.exeNetplwiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1276 regsvr32.exe 1276 regsvr32.exe 1276 regsvr32.exe 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1376 wrote to memory of 2732 1376 raserver.exe PID 1376 wrote to memory of 2732 1376 raserver.exe PID 1376 wrote to memory of 2732 1376 raserver.exe PID 1376 wrote to memory of 2476 1376 raserver.exe PID 1376 wrote to memory of 2476 1376 raserver.exe PID 1376 wrote to memory of 2476 1376 raserver.exe PID 1376 wrote to memory of 2572 1376 Dxpserver.exe PID 1376 wrote to memory of 2572 1376 Dxpserver.exe PID 1376 wrote to memory of 2572 1376 Dxpserver.exe PID 1376 wrote to memory of 2796 1376 Dxpserver.exe PID 1376 wrote to memory of 2796 1376 Dxpserver.exe PID 1376 wrote to memory of 2796 1376 Dxpserver.exe PID 1376 wrote to memory of 2764 1376 Netplwiz.exe PID 1376 wrote to memory of 2764 1376 Netplwiz.exe PID 1376 wrote to memory of 2764 1376 Netplwiz.exe PID 1376 wrote to memory of 2508 1376 Netplwiz.exe PID 1376 wrote to memory of 2508 1376 Netplwiz.exe PID 1376 wrote to memory of 2508 1376 Netplwiz.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1eeb67c0b2313b3e4bc8acd49939c136_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\cmV6xIuEz\raserver.exeC:\Users\Admin\AppData\Local\cmV6xIuEz\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵
-
C:\Users\Admin\AppData\Local\4CfWkb\Dxpserver.exeC:\Users\Admin\AppData\Local\4CfWkb\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵
-
C:\Users\Admin\AppData\Local\ke1aY\Netplwiz.exeC:\Users\Admin\AppData\Local\ke1aY\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4CfWkb\dwmapi.dllFilesize
987KB
MD514f208945405f4986fad8195e47de289
SHA12b4ce4300ff53f9feb5a6897ebf855e0b32ac1e4
SHA2563388c05f9c6667b537be3200d2ee526cc209ea7ca191d1cb7719fe2bdaa985c1
SHA512c0fd081547e0482a1a17b95e1fd48233826bacf33942cc955b24605d835e62badb9c8a7b4f38a5e509a857c7aa135f899b6b2b3e866110382c626b816187b4cb
-
C:\Users\Admin\AppData\Local\cmV6xIuEz\WTSAPI32.dllFilesize
988KB
MD5bc6b89235e5f97aef85f6ce7600ce24f
SHA182198a52ce6181975f80302ce82b9e0543dcabc7
SHA2564b3cca741decb989645471011a6a556aa02c930de8a97edeb156a1ddba42f6e5
SHA512ad541e5223d3dee42a6c83a2cde10380159c82fdbcf9c077e3d15396934137066c4de6c0f7a9c8cfa4d450ac538f3c104e7c7a2a93dc872533561e72a4078fcf
-
C:\Users\Admin\AppData\Local\ke1aY\NETPLWIZ.dllFilesize
986KB
MD5c3a9da0e0fbcfc65cb3494ed3c053776
SHA1209d1fa3eb728a3b641a0686e8798e48feb214a1
SHA25602cc35af5dbea691c62d0e6f622570310fd859db5d23654b54618c9fc341eaf5
SHA512a5f629129495cfc381736d877245f5b64b08ec63599d95378de442c5baf31cd6d1bfbe338889c3035385f2075af76831fc1fcd0cdac095c39685d1ec6b8208b5
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aqrvnhd.lnkFilesize
1KB
MD5383e4ac26cb9639d964f4f8c17db8393
SHA10ab51d4d1bd465b37c7d0f347c3081bee3d3017e
SHA256c388bb268c49ec56bd3cf88031bed7fee41603335263dac28a4185857e23239d
SHA5124d4c06ccaa0a0b39e32e02169afc8fb8dbc1465b240c2af5f346c701bea723481bd15a82117a253faceb98b89999da93a50fe04131bea2f583e829b264b29454
-
\Users\Admin\AppData\Local\4CfWkb\Dxpserver.exeFilesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
\Users\Admin\AppData\Local\cmV6xIuEz\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\ke1aY\Netplwiz.exeFilesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08
-
memory/1276-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1276-3-0x00000000001C0000-0x00000000001C7000-memory.dmpFilesize
28KB
-
memory/1276-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-70-0x0000000077016000-0x0000000077017000-memory.dmpFilesize
4KB
-
memory/1376-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-24-0x0000000002950000-0x0000000002957000-memory.dmpFilesize
28KB
-
memory/1376-26-0x00000000773B0000-0x00000000773B2000-memory.dmpFilesize
8KB
-
memory/1376-25-0x0000000077221000-0x0000000077222000-memory.dmpFilesize
4KB
-
memory/1376-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-4-0x0000000077016000-0x0000000077017000-memory.dmpFilesize
4KB
-
memory/1376-5-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/1376-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1376-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2476-58-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2476-55-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/2476-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2508-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2796-71-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2796-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB