Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
2e41aa5a63fd65eeec06fb0a3f6f0f74_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
2e41aa5a63fd65eeec06fb0a3f6f0f74_JaffaCakes118.dll
-
Size
990KB
-
MD5
2e41aa5a63fd65eeec06fb0a3f6f0f74
-
SHA1
35aab120500000294092906bc18b9932f94341a5
-
SHA256
9254cc93684a65329fc8c16f8e8ed6efb8414660f3091c9926d92d594e159e5e
-
SHA512
16f5661d173f6c376c73f38586ae7f059f501f00e518b66cb34f4a0a646db956251b63734061636f12dffb0283636c99d00b4a96086f768eacb1a992c6fd0016
-
SSDEEP
24576:pVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:pV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002990000-0x0000000002991000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpshell.exeeudcedit.exedialer.exepid process 2520 rdpshell.exe 2796 eudcedit.exe 1696 dialer.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpshell.exeeudcedit.exedialer.exepid process 1204 2520 rdpshell.exe 1204 2796 eudcedit.exe 1204 1696 dialer.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\yzEDPenFD\\eudcedit.exe" -
Processes:
rundll32.exerdpshell.exeeudcedit.exedialer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1700 rundll32.exe 1700 rundll32.exe 1700 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2624 1204 rdpshell.exe PID 1204 wrote to memory of 2624 1204 rdpshell.exe PID 1204 wrote to memory of 2624 1204 rdpshell.exe PID 1204 wrote to memory of 2520 1204 rdpshell.exe PID 1204 wrote to memory of 2520 1204 rdpshell.exe PID 1204 wrote to memory of 2520 1204 rdpshell.exe PID 1204 wrote to memory of 2720 1204 eudcedit.exe PID 1204 wrote to memory of 2720 1204 eudcedit.exe PID 1204 wrote to memory of 2720 1204 eudcedit.exe PID 1204 wrote to memory of 2796 1204 eudcedit.exe PID 1204 wrote to memory of 2796 1204 eudcedit.exe PID 1204 wrote to memory of 2796 1204 eudcedit.exe PID 1204 wrote to memory of 2528 1204 dialer.exe PID 1204 wrote to memory of 2528 1204 dialer.exe PID 1204 wrote to memory of 2528 1204 dialer.exe PID 1204 wrote to memory of 1696 1204 dialer.exe PID 1204 wrote to memory of 1696 1204 dialer.exe PID 1204 wrote to memory of 1696 1204 dialer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e41aa5a63fd65eeec06fb0a3f6f0f74_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵
-
C:\Users\Admin\AppData\Local\6V6s8\rdpshell.exeC:\Users\Admin\AppData\Local\6V6s8\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵
-
C:\Users\Admin\AppData\Local\cwr\eudcedit.exeC:\Users\Admin\AppData\Local\cwr\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵
-
C:\Users\Admin\AppData\Local\ElA4I\dialer.exeC:\Users\Admin\AppData\Local\ElA4I\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6V6s8\WINSTA.dllFilesize
995KB
MD5cc93cd0244f5953ae5d9504ab354978d
SHA1a970cc6144bc0882aec938da7155a469f06cd01e
SHA256e8e73e0d1e88143bbc1cb8adff3dbe4628e3eeb2e71b3d72f3a63c122dbb5e1d
SHA512a6bd826d2ea3b90e00f3eb1125b1bddd41f438e286adf6b566971641669f2b5ada0bafd54180c9be2df8533975ca931e2ad86862af000ed1bd384eda696f80cf
-
C:\Users\Admin\AppData\Local\ElA4I\TAPI32.dllFilesize
998KB
MD54ad65274f413ef6a6c48d9f8c3aed836
SHA1743376e6d2bcc6ad527a606ed5f07eaf6a38e085
SHA256e1b34ca517554adc9f26cba09153c2eafeff93c73db2ed7a2eed248bf910364f
SHA512ea414c687cb4e17045667a76b498e5b47c43e31d0cf1d5e802d8dabc0775c113d72f64e85c833f5b5c6e01456b64f61e5d4353a88306b8e37126519b50beca70
-
C:\Users\Admin\AppData\Local\cwr\MFC42u.dllFilesize
1017KB
MD5e0f131a0b4ec5a872a20ee7fb303d610
SHA11c8e1e01dd63fdf34288d37794f2f89d4cd05a13
SHA256767dda3451fce6d35cd429f70d272bf0a5d4013102bb4f5b9c01681d94429e02
SHA512ee51f7cfcb452554cca32f2024a3c250931a73a448ff52f2e5f6cf2e4a6de9c9fa8e0c8ca035f5ac4e25c33f37c11ca0d34925abb6c2c7ffedaccb291d25472a
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
1KB
MD5292ee8dc7c5a491bd7913c9600d156c1
SHA1c46a44ac6b733974d74e2a549b8d74cbaa9bf433
SHA2566440b44cdc222bf50476c85e26d60933c192c1658e2c9637d6e57f272fd05388
SHA512e7513d0ba6e7f8bf9cdf815338c2f45f0fab7beee6775f9728526b19536f9cd3eb05c9a4b4fb68bba5e47d869035747f1e2c0a8254ea94d9b0cb533245eac1bc
-
\Users\Admin\AppData\Local\6V6s8\rdpshell.exeFilesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603
-
\Users\Admin\AppData\Local\ElA4I\dialer.exeFilesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
\Users\Admin\AppData\Local\cwr\eudcedit.exeFilesize
351KB
MD535e397d6ca8407b86d8a7972f0c90711
SHA16b39830003906ef82442522d22b80460c03f6082
SHA2561f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde
SHA51271b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e
-
memory/1204-26-0x0000000077401000-0x0000000077402000-memory.dmpFilesize
4KB
-
memory/1204-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-25-0x0000000002970000-0x0000000002977000-memory.dmpFilesize
28KB
-
memory/1204-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-24-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-15-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-27-0x0000000077590000-0x0000000077592000-memory.dmpFilesize
8KB
-
memory/1204-4-0x00000000772F6000-0x00000000772F7000-memory.dmpFilesize
4KB
-
memory/1204-37-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-36-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-5-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/1204-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-71-0x00000000772F6000-0x00000000772F7000-memory.dmpFilesize
4KB
-
memory/1204-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1696-89-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/1696-95-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/1700-45-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1700-0-0x0000000001D00000-0x0000000001D07000-memory.dmpFilesize
28KB
-
memory/1700-1-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2520-59-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2520-54-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2520-53-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2796-72-0x0000000140000000-0x0000000140104000-memory.dmpFilesize
1.0MB
-
memory/2796-77-0x0000000140000000-0x0000000140104000-memory.dmpFilesize
1.0MB