Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
390a10d9dd8696c4e65bccab37765595_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
390a10d9dd8696c4e65bccab37765595_JaffaCakes118.dll
-
Size
1012KB
-
MD5
390a10d9dd8696c4e65bccab37765595
-
SHA1
ea431bf6ae141df4983d8085f76d96df8dbbf3c6
-
SHA256
8eca4d43a12f1fd21b5f43dbd6db31229c7e4eddbb21c3f1492ac0af27a27268
-
SHA512
b65bca41907ec81c3840bcad087c1bdb11bec6a1498d3be8d6331a9af785a9e6836b8adbb57789c6f856f6d92fedb1422411d2e55d71a3344cb8832917d26b7e
-
SSDEEP
24576:lVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:lV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-5-0x00000000024D0000-0x00000000024D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpinit.exenotepad.exeDisplaySwitch.exepid process 2468 rdpinit.exe 2860 notepad.exe 2128 DisplaySwitch.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpinit.exenotepad.exeDisplaySwitch.exepid process 1256 2468 rdpinit.exe 1256 2860 notepad.exe 1256 2128 DisplaySwitch.exe 1256 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\#SHARE~1\\9mSTC\\notepad.exe" -
Processes:
rdpinit.exenotepad.exeDisplaySwitch.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2380 regsvr32.exe 2380 regsvr32.exe 2380 regsvr32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1256 wrote to memory of 1676 1256 rdpinit.exe PID 1256 wrote to memory of 1676 1256 rdpinit.exe PID 1256 wrote to memory of 1676 1256 rdpinit.exe PID 1256 wrote to memory of 2468 1256 rdpinit.exe PID 1256 wrote to memory of 2468 1256 rdpinit.exe PID 1256 wrote to memory of 2468 1256 rdpinit.exe PID 1256 wrote to memory of 2848 1256 notepad.exe PID 1256 wrote to memory of 2848 1256 notepad.exe PID 1256 wrote to memory of 2848 1256 notepad.exe PID 1256 wrote to memory of 2860 1256 notepad.exe PID 1256 wrote to memory of 2860 1256 notepad.exe PID 1256 wrote to memory of 2860 1256 notepad.exe PID 1256 wrote to memory of 2796 1256 DisplaySwitch.exe PID 1256 wrote to memory of 2796 1256 DisplaySwitch.exe PID 1256 wrote to memory of 2796 1256 DisplaySwitch.exe PID 1256 wrote to memory of 2128 1256 DisplaySwitch.exe PID 1256 wrote to memory of 2128 1256 DisplaySwitch.exe PID 1256 wrote to memory of 2128 1256 DisplaySwitch.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\390a10d9dd8696c4e65bccab37765595_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:1676
-
C:\Users\Admin\AppData\Local\7pD\rdpinit.exeC:\Users\Admin\AppData\Local\7pD\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2468
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:2848
-
C:\Users\Admin\AppData\Local\9wOMLzD\notepad.exeC:\Users\Admin\AppData\Local\9wOMLzD\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2860
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:2796
-
C:\Users\Admin\AppData\Local\PCo5\DisplaySwitch.exeC:\Users\Admin\AppData\Local\PCo5\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD5585a9851e04759ab036e0156ae9d81f1
SHA1f771d96b91137916cf5caf20e80f10aa51adee6c
SHA25696fdac1b6981b65114155f42473e547d3cf8a97836f09fcce67a886fcc06f972
SHA512f46246e2781842d20898520c73dd8b3ec3cfbe39d705f8a59ea4b310b4e1d9b87da8823a63abec0ab83dfec1aab94374fa34c9f0df585d446abb1a4587e5b9dc
-
Filesize
1013KB
MD51e992b8eefa3d43642f6d0e429c6888b
SHA1b3fcc485d2d9579ef820663a091882c96e062f12
SHA25606cb594f58e7749a53ad4cd969095d4f25a5a13cc38fb06cbabc03d93c4cb8b0
SHA5120d3f48353f6052e29b61b5ed0ec268b7e59182278e2e9ce68ef5c80bf37c48d2324a599286d9829ba9307d37d0d4617aa155fd50e951da743189927c17ff1e5f
-
Filesize
1014KB
MD5cf4f6f3015e3c47c34497fda90f06856
SHA1a7014ae37d718627cb2bab3df73c502eeb92b482
SHA256afa33d4b67fa22c8dd99fe5d5f1ee832c8e3c82c4b1e0baf08b047e277ffaf7f
SHA5120eb04a1cdd08f9617095d897a79c873c003c3d9e6b7044ece4914aa5fe471c855a555aacb4dd654d07a57381df8e72844918493d3b345571940c10f9092d77b4
-
Filesize
948B
MD5006f109be53479d43fa668a83af81495
SHA182ea4d7e6acc0b45e599ab39e41e25467ec75c4e
SHA256fbce4ef72e4c023c932f941b5585af0b216740bb5d105466e069f7e8fb22c6ce
SHA51277ccc6e8f4988d3e27b10cbfd00b5967721f55183dae734a44c6d9911cf334fdfb93a8c37546bd66bb5b271585ce2b0eb6c01c3a9c7d775ceaa4f71c58ceef33
-
Filesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
Filesize
517KB
MD5b795e6138e29a37508285fc31e92bd78
SHA1d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a
SHA25601a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659
SHA5128312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1