Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
32c1af30f0f5b0081b6523c5aaf5b099_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
32c1af30f0f5b0081b6523c5aaf5b099_JaffaCakes118.dll
-
Size
996KB
-
MD5
32c1af30f0f5b0081b6523c5aaf5b099
-
SHA1
0859743d3d53acf62ea5a8e005deb4bc9f106664
-
SHA256
6a97f1622c6915d1d477b97abd9977a2c49bb49a12c8bb38d43ffef5d91ff0c2
-
SHA512
6340b8e7a8eaf787e863a82c3b3202411e6e43965ded038f0057a11fcbdc03034e73dbb38e08de68f24ffd17d002b24d36d654a6ded6e354f895e1e563578e0d
-
SSDEEP
24576:9VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:9V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1224-5-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
cttune.exemblctr.exedwm.exepid process 2592 cttune.exe 1628 mblctr.exe 2088 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
cttune.exemblctr.exedwm.exepid process 1224 2592 cttune.exe 1224 1628 mblctr.exe 1224 2088 dwm.exe 1224 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Javhf = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\Px0ukWJ\\mblctr.exe" -
Processes:
rundll32.execttune.exemblctr.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 856 rundll32.exe 856 rundll32.exe 856 rundll32.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1224 wrote to memory of 2760 1224 cttune.exe PID 1224 wrote to memory of 2760 1224 cttune.exe PID 1224 wrote to memory of 2760 1224 cttune.exe PID 1224 wrote to memory of 2592 1224 cttune.exe PID 1224 wrote to memory of 2592 1224 cttune.exe PID 1224 wrote to memory of 2592 1224 cttune.exe PID 1224 wrote to memory of 2164 1224 mblctr.exe PID 1224 wrote to memory of 2164 1224 mblctr.exe PID 1224 wrote to memory of 2164 1224 mblctr.exe PID 1224 wrote to memory of 1628 1224 mblctr.exe PID 1224 wrote to memory of 1628 1224 mblctr.exe PID 1224 wrote to memory of 1628 1224 mblctr.exe PID 1224 wrote to memory of 2276 1224 dwm.exe PID 1224 wrote to memory of 2276 1224 dwm.exe PID 1224 wrote to memory of 2276 1224 dwm.exe PID 1224 wrote to memory of 2088 1224 dwm.exe PID 1224 wrote to memory of 2088 1224 dwm.exe PID 1224 wrote to memory of 2088 1224 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32c1af30f0f5b0081b6523c5aaf5b099_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵
-
C:\Users\Admin\AppData\Local\jLnR67B\cttune.exeC:\Users\Admin\AppData\Local\jLnR67B\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\TOdt\mblctr.exeC:\Users\Admin\AppData\Local\TOdt\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵
-
C:\Users\Admin\AppData\Local\CfSEZ15z\dwm.exeC:\Users\Admin\AppData\Local\CfSEZ15z\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CfSEZ15z\UxTheme.dllFilesize
998KB
MD5b4ebafe4d57e834c1f4583e977ab8c99
SHA1cbfb47ce66bf5af847f1c2dfeeee6076af90eca1
SHA25647400c26a48302b364cc3c338a6eb342ee2ec17cdedfa0240ddaffd304a8d581
SHA51212dfaf763e1b08f3adf9b494b9939a34a0cddc15e0f981418a079d958335cd5e2ddf8e86b12cf0090e6192005990feb71ae6b16bae4a2cf71e385b4cf178b10b
-
C:\Users\Admin\AppData\Local\TOdt\WTSAPI32.dllFilesize
998KB
MD596eb9aac4ff358b12da7ede319a4d240
SHA14a4bd384b36bcb556e29dcb4f6da9b95df84459c
SHA256a6bf5a70ad50266b4262a681495f5bd82f6fe3e8b6d657c7d8fa4fe93ea43f34
SHA51229f72b51e4a678ef80c19b589b4bc8581ea856135a4336e9f2905f6c83b26b0b10cd25da6cc668ac82b170576fc7e847fe9d7debb8fb0bf1523b3c57e6ac33a6
-
C:\Users\Admin\AppData\Local\jLnR67B\OLEACC.dllFilesize
997KB
MD579939ee72aedc2fcb24d67418ef148f1
SHA18130cc4b7ea1da132dc4ea0acafcf5e8ccd13391
SHA256d549db5512a46b320032f5779a440c1ceff89d25a960f0ad42802638037ca42f
SHA5125d219ee62e250890c75dad34a3db85eb08189051d6da30b6166a1fb4ae2f8c046be8392eaafc5179723ed0fbb6f14380265788991343ee0dfa63d1689249df90
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Xwtifesqpwfy.lnkFilesize
1KB
MD53f6c46dc7cfe2ddf572359b1c9fdf76e
SHA1dbfb74b08c2e7b6fbd75ebfa3377b8f4dc19d585
SHA25605338f007834a0b609a3ec78bec30708051215083ac159a22e9b8fdb234e1c92
SHA512b9df3aecc559539b76866dcdebbb28fa302762bd4baa20a41c11cf3468da544ad8ff85c3395baea9658c0b1a677d139a19a14902faa83c47fb2fca836c5bc2af
-
\Users\Admin\AppData\Local\CfSEZ15z\dwm.exeFilesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
\Users\Admin\AppData\Local\TOdt\mblctr.exeFilesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
\Users\Admin\AppData\Local\jLnR67B\cttune.exeFilesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
memory/856-44-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/856-3-0x00000000003A0000-0x00000000003A7000-memory.dmpFilesize
28KB
-
memory/856-0-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-5-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/1224-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-36-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-35-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-25-0x0000000077651000-0x0000000077652000-memory.dmpFilesize
4KB
-
memory/1224-26-0x00000000777E0000-0x00000000777E2000-memory.dmpFilesize
8KB
-
memory/1224-24-0x0000000002580000-0x0000000002587000-memory.dmpFilesize
28KB
-
memory/1224-4-0x0000000077546000-0x0000000077547000-memory.dmpFilesize
4KB
-
memory/1224-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1224-68-0x0000000077546000-0x0000000077547000-memory.dmpFilesize
4KB
-
memory/1224-23-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1628-77-0x0000000000130000-0x0000000000137000-memory.dmpFilesize
28KB
-
memory/1628-76-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2088-93-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2592-58-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2592-55-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/2592-52-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB