Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
248928b7b857f742be05aa928101d5f3_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
248928b7b857f742be05aa928101d5f3_JaffaCakes118.dll
-
Size
988KB
-
MD5
248928b7b857f742be05aa928101d5f3
-
SHA1
e395a8cf2db356a95dcbd1b5adff3937d12caadf
-
SHA256
1df85ebabf3497906c02c02cd6731f3907815a8a3ccf2acdf3ae5fd6507e83e8
-
SHA512
9cb1d87c8174314e944f637fb15624a8b6d0f0f29debbd6b7a82476737cf60dddcefed3e7fa76b8755798c2888cf64fab98c0071595d3466f99b0e78df3cf4e8
-
SSDEEP
24576:GVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:GV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x00000000024F0000-0x00000000024F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2468 BdeUISrv.exe 2760 msra.exe 1584 SystemPropertiesProtection.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2468 BdeUISrv.exe 1200 Process not Found 2760 msra.exe 1200 Process not Found 1584 SystemPropertiesProtection.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\KRMQ6DK6\\RYJHOZ~1\\msra.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 regsvr32.exe 2364 regsvr32.exe 2364 regsvr32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2432 1200 Process not Found 28 PID 1200 wrote to memory of 2432 1200 Process not Found 28 PID 1200 wrote to memory of 2432 1200 Process not Found 28 PID 1200 wrote to memory of 2468 1200 Process not Found 29 PID 1200 wrote to memory of 2468 1200 Process not Found 29 PID 1200 wrote to memory of 2468 1200 Process not Found 29 PID 1200 wrote to memory of 2692 1200 Process not Found 30 PID 1200 wrote to memory of 2692 1200 Process not Found 30 PID 1200 wrote to memory of 2692 1200 Process not Found 30 PID 1200 wrote to memory of 2760 1200 Process not Found 31 PID 1200 wrote to memory of 2760 1200 Process not Found 31 PID 1200 wrote to memory of 2760 1200 Process not Found 31 PID 1200 wrote to memory of 1616 1200 Process not Found 32 PID 1200 wrote to memory of 1616 1200 Process not Found 32 PID 1200 wrote to memory of 1616 1200 Process not Found 32 PID 1200 wrote to memory of 1584 1200 Process not Found 33 PID 1200 wrote to memory of 1584 1200 Process not Found 33 PID 1200 wrote to memory of 1584 1200 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\248928b7b857f742be05aa928101d5f3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2432
-
C:\Users\Admin\AppData\Local\x0YR\BdeUISrv.exeC:\Users\Admin\AppData\Local\x0YR\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2468
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:2692
-
C:\Users\Admin\AppData\Local\LqUyh\msra.exeC:\Users\Admin\AppData\Local\LqUyh\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2760
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵PID:1616
-
C:\Users\Admin\AppData\Local\PIQ7\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\PIQ7\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD5a333d8db1cb68ded69753a9d45de392a
SHA1ddc72368075c6b9777316977317a209156f79cf3
SHA2567e3ddbe104435537e3143c5006c37d7204a7e90ef4ea04994b00d4690472949b
SHA51293eeb510564eaf848d0a56376c0b5f1eda574685dff4b3b76191a242a716c407bfec622891dc4c19c0bb3e0d7d593b6b00e2c8b354348ee38bf4e05e9bef6dc3
-
Filesize
988KB
MD59cd6869cb30313f07aa56a92ae0051d1
SHA10e1a73783f349cfd4f36b14f262da1a38206b265
SHA256ab0b168938fc17846f121c8144096ea27da40cb94af7d923c8b52a2a5c504dc4
SHA512ba4a0b212fa87cea111cb87a35b44d437275baf302c64b52946019adcc9aeebfee64be30e7da4a458ee8fc79affe23022de7dbc203c4c4b587b69f58834daad0
-
Filesize
80KB
MD505138d8f952d3fff1362f7c50158bc38
SHA1780bc59fcddf06a7494d09771b8340acffdcc720
SHA256753a43d8aa74341d06582bd6b3784dc5f8c6f46174c2a306cf284de238a9c6bd
SHA51227fa8c0af3d01f0816852d04693087f3c25d1307d8857a7ea75b0bb3e0ac927d262f5ac5a335afee150142fa3187354d33ebbcf6c3cd5cc33cb4e6cd00c50255
-
Filesize
990KB
MD50ceb686832748a23d8073c66df521334
SHA1a2ca58accea9385eee736488ab816cc160d3ac50
SHA256d94ad0daafc06e3d7e3e8170353bc3093d2fc18f67debe76bfb284217577b558
SHA5122f155e4c4e8b4a97175c834e0b91991f52a9eec1011b435fdc2bfeb149709cccc63f9583d42d2d6e151c137f12bd3e0558810072a3da2bb33295a6136e7a7b07
-
Filesize
1KB
MD561591b64a179b96c923abb1321d2e399
SHA1e483c47c750a546432a1d06e847c061285f4f671
SHA2562f45b92fbc66076680f3d3e24716cb7c7f5805a3e298e691e627653b001a73ba
SHA5124664f91c4fd90c4b86f2b40a2f8c1496f8585ec492caf7f7afd394942d3ee2c161f53298e3cc79ff359da042c634ceb6b1dcee9fbcf5dbed939c48dcbe05b3b3
-
Filesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6