Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
3646d96c51ae392630a7ac3d4e79d19e_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
3646d96c51ae392630a7ac3d4e79d19e_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
3646d96c51ae392630a7ac3d4e79d19e
-
SHA1
d352da9cffdc69418eeb3c6fd580a746e52a67cc
-
SHA256
dea896300dcba7e6727fcb52a9e07abaea0ec9524261fe9c8b079c8a9dff0b58
-
SHA512
0d825794a073c1f935a3b57788d7a30334ab64828226bb5cdbebfb1bc367947b983ad731c909eadf50527fd8e8f945b43b1e5362bb3caf35c81f7661728eb8bb
-
SSDEEP
24576:1VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:1V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1224-5-0x0000000002910000-0x0000000002911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wbengine.execmstp.exeunregmp2.exepid process 2768 wbengine.exe 2484 cmstp.exe 1828 unregmp2.exe -
Loads dropped DLL 7 IoCs
Processes:
wbengine.execmstp.exeunregmp2.exepid process 1224 2768 wbengine.exe 1224 2484 cmstp.exe 1224 1828 unregmp2.exe 1224 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\Zl0yyvm\\cmstp.exe" -
Processes:
rundll32.exewbengine.execmstp.exeunregmp2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1300 rundll32.exe 1300 rundll32.exe 1300 rundll32.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1224 wrote to memory of 2372 1224 wbengine.exe PID 1224 wrote to memory of 2372 1224 wbengine.exe PID 1224 wrote to memory of 2372 1224 wbengine.exe PID 1224 wrote to memory of 2768 1224 wbengine.exe PID 1224 wrote to memory of 2768 1224 wbengine.exe PID 1224 wrote to memory of 2768 1224 wbengine.exe PID 1224 wrote to memory of 1244 1224 cmstp.exe PID 1224 wrote to memory of 1244 1224 cmstp.exe PID 1224 wrote to memory of 1244 1224 cmstp.exe PID 1224 wrote to memory of 2484 1224 cmstp.exe PID 1224 wrote to memory of 2484 1224 cmstp.exe PID 1224 wrote to memory of 2484 1224 cmstp.exe PID 1224 wrote to memory of 2240 1224 unregmp2.exe PID 1224 wrote to memory of 2240 1224 unregmp2.exe PID 1224 wrote to memory of 2240 1224 unregmp2.exe PID 1224 wrote to memory of 1828 1224 unregmp2.exe PID 1224 wrote to memory of 1828 1224 unregmp2.exe PID 1224 wrote to memory of 1828 1224 unregmp2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3646d96c51ae392630a7ac3d4e79d19e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵
-
C:\Users\Admin\AppData\Local\NCsr\wbengine.exeC:\Users\Admin\AppData\Local\NCsr\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵
-
C:\Users\Admin\AppData\Local\O1cR\cmstp.exeC:\Users\Admin\AppData\Local\O1cR\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵
-
C:\Users\Admin\AppData\Local\o31Aa\unregmp2.exeC:\Users\Admin\AppData\Local\o31Aa\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\NCsr\XmlLite.dllFilesize
1.2MB
MD57b59e506480c7b68253e4f6bad0fe848
SHA18d9c6676fab08e77a6c6e515d46e48b635244b0d
SHA2569551d5db95a08678caab87192b66ce32cb22fac50e9a572f161f97527ae4a889
SHA512a0278d562edacb305b9a5f952a8a2263227487a6fbeed443cc15c0111f4d760f5b37d0232c1cdca40ce703e177cb9e696417e419abc987695c9daf61bed2d4c1
-
C:\Users\Admin\AppData\Local\O1cR\VERSION.dllFilesize
1.2MB
MD5c6d1df33a2df3f45600cef249a4e74ff
SHA18815eb87d2f5244157e367c9b4d4ca0a878df670
SHA2566d486c9e62a5bc9ae79f85edcec1b702ffe46b5f1e0f5928c09405a47629847b
SHA512e9c672467a01e6229c045d6617608a96d95a93986757956e58ca918a1ca781086d5cef5a7fc0872503e3391bd7a0988c6fc9085d5d47cd40abbd2c8d9106ad34
-
C:\Users\Admin\AppData\Local\o31Aa\slc.dllFilesize
1.2MB
MD57f4f011fed615a3a82e42429568e51ac
SHA18ad36bbfe9a63dbadca99b3c4b9583863c7d3cea
SHA256e72f5fed0e2dc4b2e53c0610d16c349a88f60eaf482b654fcbfa2a828acc94ba
SHA51252fb3591ff015b88539711c3c66fb0d39c1ab3b6d7c56c1b343a5e396df91f7cd9e23502b9e6a6a531a49d0d4b66afd92a40ed5f02130d6f8cb9100eff92ff3e
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD5054a5c85c9f753291d5d44722e37eb04
SHA1ac6710e4bdcd9b10b802793d02a8e8d06d0f699c
SHA256e0a23a5ad89147602f97f0d16402472708af44e1419fd1d9b11792105bfbb280
SHA512a1e3e2cddc60a16b935e06240ec8091cbdce1b886bb08f5ae8b25336eec6150eccd031d088fe8e48db24005ebeb542ab0b9d4e1e4f909da15a1083ded2573a32
-
\Users\Admin\AppData\Local\NCsr\wbengine.exeFilesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
\Users\Admin\AppData\Local\O1cR\cmstp.exeFilesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
\Users\Admin\AppData\Local\o31Aa\unregmp2.exeFilesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
memory/1224-16-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-13-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-4-0x0000000076D36000-0x0000000076D37000-memory.dmpFilesize
4KB
-
memory/1224-15-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-14-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-12-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-11-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-26-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-9-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-28-0x0000000076FD0000-0x0000000076FD2000-memory.dmpFilesize
8KB
-
memory/1224-32-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-31-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-27-0x0000000076E41000-0x0000000076E42000-memory.dmpFilesize
4KB
-
memory/1224-5-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/1224-8-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-17-0x00000000028F0000-0x00000000028F7000-memory.dmpFilesize
28KB
-
memory/1224-7-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-10-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1224-59-0x0000000076D36000-0x0000000076D37000-memory.dmpFilesize
4KB
-
memory/1300-40-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1300-1-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1300-0-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/1828-85-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/1828-91-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2484-67-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/2484-73-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2768-54-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2768-49-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2768-48-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB