Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
3c561335b84b1b6ec405b90307df1495_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
3c561335b84b1b6ec405b90307df1495_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
3c561335b84b1b6ec405b90307df1495
-
SHA1
96c6d79ab3982f5598a8883a46d3605f79bdcc2f
-
SHA256
04cf75d0e0684e29799390a40209ee9a357fcd561af47662b26dee8954a31bcb
-
SHA512
9424214f2ae46ae5e5b99f728872ac203554b1004c1aa2f4664cc36cb7f521b953a96783e86e243d4bae42f1099e5669858557568e0c980366d5231fa4fd0793
-
SSDEEP
24576:WVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:WV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1180-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FXSCOVER.exeFXSCOVER.exeDevicePairingWizard.exepid process 2448 FXSCOVER.exe 2504 FXSCOVER.exe 308 DevicePairingWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
FXSCOVER.exeFXSCOVER.exeDevicePairingWizard.exepid process 1180 2448 FXSCOVER.exe 1180 2504 FXSCOVER.exe 1180 308 DevicePairingWizard.exe 1180 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\szpYYV\\FXSCOVER.exe" -
Processes:
FXSCOVER.exeFXSCOVER.exeDevicePairingWizard.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1180 wrote to memory of 2708 1180 FXSCOVER.exe PID 1180 wrote to memory of 2708 1180 FXSCOVER.exe PID 1180 wrote to memory of 2708 1180 FXSCOVER.exe PID 1180 wrote to memory of 2448 1180 FXSCOVER.exe PID 1180 wrote to memory of 2448 1180 FXSCOVER.exe PID 1180 wrote to memory of 2448 1180 FXSCOVER.exe PID 1180 wrote to memory of 624 1180 FXSCOVER.exe PID 1180 wrote to memory of 624 1180 FXSCOVER.exe PID 1180 wrote to memory of 624 1180 FXSCOVER.exe PID 1180 wrote to memory of 2504 1180 FXSCOVER.exe PID 1180 wrote to memory of 2504 1180 FXSCOVER.exe PID 1180 wrote to memory of 2504 1180 FXSCOVER.exe PID 1180 wrote to memory of 2800 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 2800 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 2800 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 308 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 308 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 308 1180 DevicePairingWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c561335b84b1b6ec405b90307df1495_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\TuXc5ghi\FXSCOVER.exeC:\Users\Admin\AppData\Local\TuXc5ghi\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\iIsuk8u\FXSCOVER.exeC:\Users\Admin\AppData\Local\iIsuk8u\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\QI8\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\QI8\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\QI8\MFC42u.dllFilesize
1.3MB
MD514f8d91d4232b1ab1dd5dabacabc3286
SHA13bad9baf1c1d5f4854fcffde87489ce10007eb03
SHA2562982addbb642dcd86e24db6bb14e8ddf1aea8731d84fb040b678459c338157e0
SHA51204cec42235000c9a38e73f5b455063f28415125c1ab9fbbf66373005be4f7eecda266cb5bd17844fee61842c6cfdced79a7ee91ee6f6a762896a39ef49959b72
-
C:\Users\Admin\AppData\Local\TuXc5ghi\MFC42u.dllFilesize
1.3MB
MD522cb0c4d284de72ff56320515960cbe8
SHA1931c6bb628b49ad504c0828ab711e25ca087706e
SHA256b6577d5cb6d772732f0f4795fed9472835387cc8607a6a615cf9751872ed9261
SHA51204d1277d9012751e73055ed7efeb3792db39f36e8b4c6cc23e05b7e298b639169f651356d303220f58375710a33252c701440eb00b1f04886da2f76b053ea426
-
C:\Users\Admin\AppData\Local\iIsuk8u\MFC42u.dllFilesize
1.3MB
MD54f5d0223839a54944f07e88a29ebb9cb
SHA18363d3a807ef6c2c21d72a098d9fd9a4d9848d03
SHA2565dbca427891514719df22cef512d1cf80077c5a0c3fe1f75a4dab33b7c894b45
SHA51208b57953f5e626561af403f74bb0d42eb7437c06c3b02ae78d3d0aa09f7ab4f791adebd44d162b8678ef076e8831ec7d88b0c9af31521fae330654009d1772f5
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mewsro.lnkFilesize
1KB
MD59c3358a453c04e313b8e510bf5d99b8d
SHA18337f6e3316bbee0451df47ce6ff7f6f6ce58329
SHA25670b21af50a30340cbf60c7e501a86f71a35f7ae547ff0adff4641491ea99e858
SHA512d53edb809b6d4404ca647d21deea3a893fa40338e014bb92ab9eb8f798b5843832433abaa0d8c66157a433f6513845663bcfa847f8a29246351af3ff8baeb400
-
\Users\Admin\AppData\Local\QI8\DevicePairingWizard.exeFilesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
\Users\Admin\AppData\Local\TuXc5ghi\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
memory/308-96-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/308-93-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/1180-36-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-8-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-14-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-27-0x0000000077B80000-0x0000000077B82000-memory.dmpFilesize
8KB
-
memory/1180-24-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-26-0x00000000779F1000-0x00000000779F2000-memory.dmpFilesize
4KB
-
memory/1180-25-0x0000000002DD0000-0x0000000002DD7000-memory.dmpFilesize
28KB
-
memory/1180-13-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-4-0x00000000777E6000-0x00000000777E7000-memory.dmpFilesize
4KB
-
memory/1180-10-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-37-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmpFilesize
4KB
-
memory/1180-12-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-15-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-7-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-11-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-9-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1180-64-0x00000000777E6000-0x00000000777E7000-memory.dmpFilesize
4KB
-
memory/1676-45-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1676-3-0x00000000003A0000-0x00000000003A7000-memory.dmpFilesize
28KB
-
memory/1676-1-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2448-59-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2448-54-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2448-53-0x0000000000200000-0x0000000000207000-memory.dmpFilesize
28KB
-
memory/2504-72-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/2504-78-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB