Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
3e3c3c8c63d07d53471c045b4b8436f8_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
3e3c3c8c63d07d53471c045b4b8436f8_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
3e3c3c8c63d07d53471c045b4b8436f8
-
SHA1
91dbeda1577541b699330a9c923888d2409e3e17
-
SHA256
f929aa41bdd0ed0a0caaa89a180f6f5aec0fda92fcf627e80c7838bb8e86e7d1
-
SHA512
7bb1fb036e417ab8ec2ce2866974051703606bb16d0227e0970e4b09eecfb4d2dadda06d5b14c22303fa83b14901f019c3b3efff4e39cf5788f6ea76721fea2d
-
SSDEEP
24576:7yTonNVlKTt/Q5ECvVP7hpJMvjtKpvPf9+m6kLRqgSyI:7yWRKTt/QlPVp3h9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002E10000-0x0000000002E11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
cmstp.exewisptis.exetaskmgr.exepid process 2648 cmstp.exe 1084 wisptis.exe 3068 taskmgr.exe -
Loads dropped DLL 7 IoCs
Processes:
cmstp.exewisptis.exetaskmgr.exepid process 1204 2648 cmstp.exe 1204 1084 wisptis.exe 1204 3068 taskmgr.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\xgo2fxp\\wisptis.exe" -
Processes:
wisptis.exetaskmgr.exerundll32.execmstp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskmgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1596 rundll32.exe 1596 rundll32.exe 1596 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2532 1204 cmstp.exe PID 1204 wrote to memory of 2532 1204 cmstp.exe PID 1204 wrote to memory of 2532 1204 cmstp.exe PID 1204 wrote to memory of 2648 1204 cmstp.exe PID 1204 wrote to memory of 2648 1204 cmstp.exe PID 1204 wrote to memory of 2648 1204 cmstp.exe PID 1204 wrote to memory of 2228 1204 wisptis.exe PID 1204 wrote to memory of 2228 1204 wisptis.exe PID 1204 wrote to memory of 2228 1204 wisptis.exe PID 1204 wrote to memory of 1084 1204 wisptis.exe PID 1204 wrote to memory of 1084 1204 wisptis.exe PID 1204 wrote to memory of 1084 1204 wisptis.exe PID 1204 wrote to memory of 3064 1204 taskmgr.exe PID 1204 wrote to memory of 3064 1204 taskmgr.exe PID 1204 wrote to memory of 3064 1204 taskmgr.exe PID 1204 wrote to memory of 3068 1204 taskmgr.exe PID 1204 wrote to memory of 3068 1204 taskmgr.exe PID 1204 wrote to memory of 3068 1204 taskmgr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e3c3c8c63d07d53471c045b4b8436f8_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵
-
C:\Users\Admin\AppData\Local\vtL\cmstp.exeC:\Users\Admin\AppData\Local\vtL\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵
-
C:\Users\Admin\AppData\Local\siKrPe\wisptis.exeC:\Users\Admin\AppData\Local\siKrPe\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\taskmgr.exeC:\Windows\system32\taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\t817\taskmgr.exeC:\Users\Admin\AppData\Local\t817\taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\siKrPe\MAGNIFICATION.dllFilesize
1.2MB
MD5e48995542ccc49719ba8df8f0f5fbc01
SHA10158033a6c9d1619d6d7f1a773d20f99fc8b8e72
SHA2569a7b8bf91892b3a555469bfbba7319dcf64b7d2a2f7744259b301ed46b2b4859
SHA51213e85ceeb748ace0559e7b6cb5f9b66d0a77ba83a788a4a6c8e9a00da984fce236f5e98e8c032d5dad56b38220e349d0918b9dc59ce1043b2a244514c2be34c7
-
C:\Users\Admin\AppData\Local\t817\UxTheme.dllFilesize
1.2MB
MD5dffbc40a25bb01f8e7e8bb134180f1f2
SHA100ba9b181bc958183618d06a123abda01a00f363
SHA256f728ba8d56fd47f7bd400bab7a45668b0b3055ab049eb93ccc23dc88809c8f9e
SHA512cdd89cf3fac305a71321e935585ec527d68946cc9c97294522c7bbc5b8537c45b428422cf2af82d722b2454a63bd1245485789840d44bda9387df7161a21fdcd
-
C:\Users\Admin\AppData\Local\vtL\VERSION.dllFilesize
1.2MB
MD5dcae4c2655eab8fa29e8b4fef17488b9
SHA19e463a393a80d6ef8d900c5baffb9b4358a41bf7
SHA256cce95802a36749f3ce9cd1a5a23635d2035541b67c8f8ea33b338b76b8399786
SHA51270f19256c772fc8c67d94ddb21e2f5d14a03698b700ee9845aaae36338a1529144d2fc9e07c161be5cba8dcfb0d8c7364e9fc31510ea0cecfb160b204b8dfc24
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mewsro.lnkFilesize
1KB
MD5d83680ae5672e040a202110f0cca43db
SHA1cd418c871645fc6753ad48f51dbe8ff1ce543c11
SHA256220aa5d9f268051bd2315fbc124644ef3ffc5f0a91efc65c416e3bdd2af8a212
SHA51265f272b9c46ca50e1897e68d98c5bb4779a2b4154246bef5a6db601baf717a079566e469e32be11e97f4e438445a2541648f83ee0525ac260ad485e28f4d6e68
-
\Users\Admin\AppData\Local\siKrPe\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
\Users\Admin\AppData\Local\t817\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
\Users\Admin\AppData\Local\vtL\cmstp.exeFilesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
memory/1084-79-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1084-76-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/1204-27-0x0000000077581000-0x0000000077582000-memory.dmpFilesize
4KB
-
memory/1204-23-0x0000000002DF0000-0x0000000002DF7000-memory.dmpFilesize
28KB
-
memory/1204-14-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-12-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-11-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-10-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-9-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-4-0x0000000077476000-0x0000000077477000-memory.dmpFilesize
4KB
-
memory/1204-28-0x0000000077710000-0x0000000077712000-memory.dmpFilesize
8KB
-
memory/1204-37-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-38-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-5-0x0000000002E10000-0x0000000002E11000-memory.dmpFilesize
4KB
-
memory/1204-26-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-16-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-8-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-7-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-15-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1204-65-0x0000000077476000-0x0000000077477000-memory.dmpFilesize
4KB
-
memory/1204-13-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1596-46-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1596-0-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1596-3-0x0000000000320000-0x0000000000327000-memory.dmpFilesize
28KB
-
memory/2648-60-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2648-57-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2648-54-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/3068-96-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB