Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
2d1656941c05b70eae56d107d83f5577_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
2d1656941c05b70eae56d107d83f5577_JaffaCakes118.dll
-
Size
991KB
-
MD5
2d1656941c05b70eae56d107d83f5577
-
SHA1
f5b3b27def84a732714206ea9dad1c4b2072ea86
-
SHA256
42c3f84d09b06797c56cad933f7451ba82d1de626e48d88a57c602475057454c
-
SHA512
26ed912364236a321553a13fe7d19c886cb9b883481a54ba1a875a03055720dcb672e0e8aba8a37c9002b5267203cb88190ee08ae4391bade92713cacc4de883
-
SSDEEP
24576:VVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:VV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000002E70000-0x0000000002E71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msra.exep2phost.exerdpinit.exepid process 2456 msra.exe 2844 p2phost.exe 1484 rdpinit.exe -
Loads dropped DLL 7 IoCs
Processes:
msra.exep2phost.exerdpinit.exepid process 1196 2456 msra.exe 1196 2844 p2phost.exe 1196 1484 rdpinit.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\WIZeauhNhO\\p2phost.exe" -
Processes:
rundll32.exemsra.exep2phost.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p2phost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1728 rundll32.exe 1728 rundll32.exe 1728 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2416 1196 msra.exe PID 1196 wrote to memory of 2416 1196 msra.exe PID 1196 wrote to memory of 2416 1196 msra.exe PID 1196 wrote to memory of 2456 1196 msra.exe PID 1196 wrote to memory of 2456 1196 msra.exe PID 1196 wrote to memory of 2456 1196 msra.exe PID 1196 wrote to memory of 2824 1196 p2phost.exe PID 1196 wrote to memory of 2824 1196 p2phost.exe PID 1196 wrote to memory of 2824 1196 p2phost.exe PID 1196 wrote to memory of 2844 1196 p2phost.exe PID 1196 wrote to memory of 2844 1196 p2phost.exe PID 1196 wrote to memory of 2844 1196 p2phost.exe PID 1196 wrote to memory of 1540 1196 rdpinit.exe PID 1196 wrote to memory of 1540 1196 rdpinit.exe PID 1196 wrote to memory of 1540 1196 rdpinit.exe PID 1196 wrote to memory of 1484 1196 rdpinit.exe PID 1196 wrote to memory of 1484 1196 rdpinit.exe PID 1196 wrote to memory of 1484 1196 rdpinit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d1656941c05b70eae56d107d83f5577_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵
-
C:\Users\Admin\AppData\Local\gp8sdOpkQ\msra.exeC:\Users\Admin\AppData\Local\gp8sdOpkQ\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\p2phost.exeC:\Windows\system32\p2phost.exe1⤵
-
C:\Users\Admin\AppData\Local\Taid\p2phost.exeC:\Users\Admin\AppData\Local\Taid\p2phost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵
-
C:\Users\Admin\AppData\Local\dm9IAMtuC\rdpinit.exeC:\Users\Admin\AppData\Local\dm9IAMtuC\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Taid\P2PCOLLAB.dllFilesize
994KB
MD5ccc065b963f1abb09d1f15fdea79c943
SHA15a078e4b26f8a1f3efed35448750a33c9d2183d5
SHA256eed044a2290ecbc3d9ee499b189e6bc7ef482f52e6eebcce4382553a441c2ea4
SHA5120a710b524591dd1528275f546171b3dfc0cf8a34246360a8137825b555868b2230bbe1d684a874ec186a8907b820bac6416996b895d2b2751cf49d095d2dd0d4
-
C:\Users\Admin\AppData\Local\dm9IAMtuC\WTSAPI32.dllFilesize
993KB
MD5796dc981bda47fc1cb093aba11df73c3
SHA13f095ae78a053a5ef38b9cafee703d79aba5c5c6
SHA256d9a2a6d1cb24c2b0108f2edd5f5ac6efa5541259b82b583527cc1af5e58a070a
SHA512ba5bb2b9578aaea36beb8351645fd02e1b4d58fd3b2e47254a7fc571056dd0719c0ad2e04f2550b9ecc711e84a4d6e0edce9b7ecfcd9744311480cbf6207404b
-
C:\Users\Admin\AppData\Local\gp8sdOpkQ\NDFAPI.DLLFilesize
992KB
MD5180f5be72e3badb985e769d3f5b87735
SHA14870e4e3d5eb5eef4553efff0e229334274a2f07
SHA256872bffe5eaa0ffcccefa6fcfad06e3bc345d5b4640c6b52c806593fe746bb1bd
SHA51240bd7573e91d7a12ca8182e90a1c012b55a8e7108d4c3ac30b824aa3a6b198e1977b76e42a045b9b9db064c9f0078978a1b041b7f5b94c90fcc38303904ab012
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
974B
MD566ad0f2c087581489241a259fc4eecf3
SHA1b08831e2af0f185e2a77fd3ee1d374d615bf096f
SHA25667b8ed3044b8442c5091d7e8623d7b41f12bb596e801f529e6b714b21465465a
SHA51264ec11100135433948a752ddcd308fbdd94edc8e8afaaa7908163c3047570fb457c73adfaef4dd3439ecec0b692f4e269c3dd7e9c1f18b3b89191e5044aac6c1
-
\Users\Admin\AppData\Local\Taid\p2phost.exeFilesize
172KB
MD50dbd420477352b278dfdc24f4672b79c
SHA1df446f25be33ac60371557717073249a64e04bb2
SHA2561baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345
SHA51284014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1
-
\Users\Admin\AppData\Local\dm9IAMtuC\rdpinit.exeFilesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
\Users\Admin\AppData\Local\gp8sdOpkQ\msra.exeFilesize
636KB
MD5e79df53bad587e24b3cf965a5746c7b6
SHA187a97ec159a3fc1db211f3c2c62e4d60810e7a70
SHA2564e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d
SHA5129a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb
-
memory/1196-24-0x0000000002B10000-0x0000000002B17000-memory.dmpFilesize
28KB
-
memory/1196-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-28-0x00000000778B0000-0x00000000778B2000-memory.dmpFilesize
8KB
-
memory/1196-27-0x0000000077721000-0x0000000077722000-memory.dmpFilesize
4KB
-
memory/1196-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-4-0x0000000077516000-0x0000000077517000-memory.dmpFilesize
4KB
-
memory/1196-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-5-0x0000000002E70000-0x0000000002E71000-memory.dmpFilesize
4KB
-
memory/1196-73-0x0000000077516000-0x0000000077517000-memory.dmpFilesize
4KB
-
memory/1196-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1484-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1728-2-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1728-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1728-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2456-58-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2456-55-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2456-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2844-74-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2844-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB