Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
2ff600654e8bc24df8ca6ae128b918c1_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
2ff600654e8bc24df8ca6ae128b918c1_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2ff600654e8bc24df8ca6ae128b918c1
-
SHA1
8a77bb477ae20d0376cabf30661e79d01b0b9262
-
SHA256
0f03f9d5f8d994375513f8839941e3784843030583098a0b7baace0ef9c896a8
-
SHA512
5f92fbd30bf99d66b3571d0c66b3e65e678aaa04bc239630b7ba7da452544fa790df4f96d2e9e41928bc48bf23ca193668fc0ad813ddce6217cfb2bddb3555d8
-
SSDEEP
24576:5uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:r9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-5-0x0000000002E50000-0x0000000002E51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dialer.exeFXSCOVER.exewextract.exepid process 2444 dialer.exe 2628 FXSCOVER.exe 1648 wextract.exe -
Loads dropped DLL 7 IoCs
Processes:
dialer.exeFXSCOVER.exewextract.exepid process 1212 2444 dialer.exe 1212 2628 FXSCOVER.exe 1212 1648 wextract.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\AutomaticDestinations\\eSAAn0\\FXSCOVER.exe" -
Processes:
rundll32.exedialer.exeFXSCOVER.exewextract.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2412 rundll32.exe 2412 rundll32.exe 2412 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 2740 1212 dialer.exe PID 1212 wrote to memory of 2740 1212 dialer.exe PID 1212 wrote to memory of 2740 1212 dialer.exe PID 1212 wrote to memory of 2444 1212 dialer.exe PID 1212 wrote to memory of 2444 1212 dialer.exe PID 1212 wrote to memory of 2444 1212 dialer.exe PID 1212 wrote to memory of 2816 1212 FXSCOVER.exe PID 1212 wrote to memory of 2816 1212 FXSCOVER.exe PID 1212 wrote to memory of 2816 1212 FXSCOVER.exe PID 1212 wrote to memory of 2628 1212 FXSCOVER.exe PID 1212 wrote to memory of 2628 1212 FXSCOVER.exe PID 1212 wrote to memory of 2628 1212 FXSCOVER.exe PID 1212 wrote to memory of 2812 1212 wextract.exe PID 1212 wrote to memory of 2812 1212 wextract.exe PID 1212 wrote to memory of 2812 1212 wextract.exe PID 1212 wrote to memory of 1648 1212 wextract.exe PID 1212 wrote to memory of 1648 1212 wextract.exe PID 1212 wrote to memory of 1648 1212 wextract.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2ff600654e8bc24df8ca6ae128b918c1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵
-
C:\Users\Admin\AppData\Local\FDn\dialer.exeC:\Users\Admin\AppData\Local\FDn\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\rdhKarGf4\FXSCOVER.exeC:\Users\Admin\AppData\Local\rdhKarGf4\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\byHZ\wextract.exeC:\Users\Admin\AppData\Local\byHZ\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\FDn\TAPI32.dllFilesize
1.2MB
MD5ec6572bb5efaed3c4294310bbcc42291
SHA133754704b2badab88c79aa4470c50aef88d52ab5
SHA256864fee2f579b866672ae15ac7a93307b877f4ed28f1b1388dda479d71c5ceb1c
SHA5126e3dad6ceff933663a5c5128f642eadd9916195f78eefad09e14364dc52570035581bf013e279d5afacfce2a7459287bf769d2818944127e292d6ce102f8f386
-
C:\Users\Admin\AppData\Local\FDn\dialer.exeFilesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
C:\Users\Admin\AppData\Local\byHZ\VERSION.dllFilesize
1.2MB
MD52c1af4f7bff4cfde85b623de4f250a16
SHA13e20d162aeac78cb0e1987475627dd3df4af38c7
SHA256aa83788991bf8ed2199871fe977b170127ed080267e62f69d8636251226f82a8
SHA5126e6cd6c5adbf1d94c9686fef1868ce93d834df81a1cad4a3956fe8d2cf70a9e3ace75bd1c9dd1f230a1fcab9238532eec33db2568615801137842249e94209b7
-
C:\Users\Admin\AppData\Local\byHZ\wextract.exeFilesize
140KB
MD51ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
C:\Users\Admin\AppData\Local\rdhKarGf4\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
1KB
MD514aecae2f0145cd0d93aa71e600e180c
SHA12d7cb0efa558a38856c7c11d96b81dcb2ff1de2a
SHA25610509680a8b7acbea148fdd58624793d1768214e87ccbf13a85ba37c361bf166
SHA51221d59beef75ba432aab5b47e63985f5efff48a8f873e7c943f8268a6eb97cf83643b4453206766651891ed585a2981112ad1115e8d685a1adc8ffc8034c15672
-
\Users\Admin\AppData\Local\rdhKarGf4\MFC42u.dllFilesize
1.2MB
MD5885e1189a3f8fd5e2e4709d3b418fda7
SHA169cb368e415c1ee8c7821c204ba84925ab3c8433
SHA256bba3cb6731b090b6e510d532cebcd3f081143fb893cfeb8f00e5dbb6ab206571
SHA512b69be164cf95430eec0ea0de721f3332f839b0d7ba8c2a3435d2503747937f0e3911d0d9b427e2af73b8bc7ea6c9c5c2d6a05ec1f868e9e0b9a56c515c6e4c7d
-
memory/1212-26-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-10-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-12-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-4-0x0000000077726000-0x0000000077727000-memory.dmpFilesize
4KB
-
memory/1212-27-0x0000000002E30000-0x0000000002E37000-memory.dmpFilesize
28KB
-
memory/1212-18-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-17-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-16-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-15-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-14-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-13-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-32-0x0000000077AC0000-0x0000000077AC2000-memory.dmpFilesize
8KB
-
memory/1212-39-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-38-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-31-0x0000000077931000-0x0000000077932000-memory.dmpFilesize
4KB
-
memory/1212-5-0x0000000002E50000-0x0000000002E51000-memory.dmpFilesize
4KB
-
memory/1212-9-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-11-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-8-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-7-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1212-66-0x0000000077726000-0x0000000077727000-memory.dmpFilesize
4KB
-
memory/1648-95-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/1648-92-0x000007FEF64D0000-0x000007FEF6611000-memory.dmpFilesize
1.3MB
-
memory/1648-98-0x000007FEF64D0000-0x000007FEF6611000-memory.dmpFilesize
1.3MB
-
memory/2412-47-0x000007FEF64E0000-0x000007FEF6620000-memory.dmpFilesize
1.2MB
-
memory/2412-1-0x000007FEF64E0000-0x000007FEF6620000-memory.dmpFilesize
1.2MB
-
memory/2412-2-0x00000000001B0000-0x00000000001B7000-memory.dmpFilesize
28KB
-
memory/2444-61-0x000007FEF7050000-0x000007FEF7192000-memory.dmpFilesize
1.3MB
-
memory/2444-55-0x000007FEF7050000-0x000007FEF7192000-memory.dmpFilesize
1.3MB
-
memory/2444-58-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/2628-77-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/2628-74-0x000007FEF64D0000-0x000007FEF6617000-memory.dmpFilesize
1.3MB
-
memory/2628-80-0x000007FEF64D0000-0x000007FEF6617000-memory.dmpFilesize
1.3MB