Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
3173e2551fd79567f5818bb1f1d98c79_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
3173e2551fd79567f5818bb1f1d98c79_JaffaCakes118.dll
-
Size
991KB
-
MD5
3173e2551fd79567f5818bb1f1d98c79
-
SHA1
2db6358760c912f1c724445878b12a6873ad30e0
-
SHA256
3f812c9450e03e319c53151a7d187d9e5627779c631dcce038b480bad6bcf144
-
SHA512
701c4c5e2be7e92a0c50d0c5eb7393164b4295fcfe4a32947302ed70b54f5ec714d5b8ca64752783d768b7797b87ec1604a96bbfa1ed536d9e0a5f8b5cb8bc1a
-
SSDEEP
24576:SVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:SV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002220000-0x0000000002221000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpclip.exeSystemPropertiesDataExecutionPrevention.exespinstall.exepid process 2412 rdpclip.exe 2324 SystemPropertiesDataExecutionPrevention.exe 2676 spinstall.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpclip.exeSystemPropertiesDataExecutionPrevention.exespinstall.exepid process 1192 2412 rdpclip.exe 1192 2324 SystemPropertiesDataExecutionPrevention.exe 1192 2676 spinstall.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\7XARqFdHA\\SystemPropertiesDataExecutionPrevention.exe" -
Processes:
rdpclip.exeSystemPropertiesDataExecutionPrevention.exespinstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2868 regsvr32.exe 2868 regsvr32.exe 2868 regsvr32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2456 1192 rdpclip.exe PID 1192 wrote to memory of 2456 1192 rdpclip.exe PID 1192 wrote to memory of 2456 1192 rdpclip.exe PID 1192 wrote to memory of 2412 1192 rdpclip.exe PID 1192 wrote to memory of 2412 1192 rdpclip.exe PID 1192 wrote to memory of 2412 1192 rdpclip.exe PID 1192 wrote to memory of 2392 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2392 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2392 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2324 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2324 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2324 1192 SystemPropertiesDataExecutionPrevention.exe PID 1192 wrote to memory of 2396 1192 spinstall.exe PID 1192 wrote to memory of 2396 1192 spinstall.exe PID 1192 wrote to memory of 2396 1192 spinstall.exe PID 1192 wrote to memory of 2676 1192 spinstall.exe PID 1192 wrote to memory of 2676 1192 spinstall.exe PID 1192 wrote to memory of 2676 1192 spinstall.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3173e2551fd79567f5818bb1f1d98c79_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2456
-
C:\Users\Admin\AppData\Local\bnBEz\rdpclip.exeC:\Users\Admin\AppData\Local\bnBEz\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2412
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:2392
-
C:\Users\Admin\AppData\Local\ik3uuCW7Y\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\ik3uuCW7Y\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2324
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:2396
-
C:\Users\Admin\AppData\Local\nOLiDs\spinstall.exeC:\Users\Admin\AppData\Local\nOLiDs\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD54435c4a9f55a357859f31a2a84b012ec
SHA169e90a891efc4dd97d9e41bbe6975f20c27b13da
SHA2560f77d5d86c8cc7500ca63cecdb2d20b9734124665c1e982e12e67cd6cdf6d3d1
SHA5127fe444d1497b4efeb639c5a0da0fd34992d3c1fe0ec43b2f188f99092936a720949f560d1c11c585ef8dfaea51ac9ac24de94ae789a39fa08c099b86fd28c3d3
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
991KB
MD54612082c93a9384a4b2df1e308d8bc8a
SHA1a5703538705397dc021cec2307a6335ecf7b28b2
SHA2562d0b02f380c7e4e048fccd00fb52a61da195f17973f1feea368ee2b14682d020
SHA512e17d6c1251cf2f44c1a1ba6be6c5567b3f248efbc0482f6f0fe0441a254b99331610b368f44d180f3d7f86ed09b7ee566ff744a259e53933c1eecf0bd60beed6
-
Filesize
1KB
MD5bf5fd3d84159902a08a8f32233c6b78c
SHA1d5576abb06f8256cb245b195d9be81c3283ce3d0
SHA25609a11b262e620c58bd9b3f2bab66783d352f026c7ffa85c38df3884bb21114b4
SHA5124604a8a02461f9a17b69323bf651b5215348f852aafabb569e13e345207ab8465dbf4ae0162c267661d95a682bcde1d78430da2f49f5811c3edfa729c121d140
-
Filesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
994KB
MD59ef60235aabf8942fc76faed98da3da4
SHA10ad96353f5edb7ef8e90d1b81ea4e4f7e40e26c6
SHA256c6ed38d35e4303e6d699ae65a80275dcc05495b70a3fb3134f0f41938d49dc7b
SHA512f5341bdad7a35a4b9613c517d1b993671bf395bd7c0064a79d3c310987f5c53c0f820d8273cecf131f15470042376fe9fb8e82534d9f422f63ad2d79d967d3f5