Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
4b2042c03f8a331856122cb3f8c1029e_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
4b2042c03f8a331856122cb3f8c1029e_JaffaCakes118.dll
-
Size
994KB
-
MD5
4b2042c03f8a331856122cb3f8c1029e
-
SHA1
57527c2704de7f7c191b38dd75db13961755dcda
-
SHA256
a2463dbdef943b264b909c265284f607f024c4bbfb5a85f89c7c0543dd1f2671
-
SHA512
5caedd38a3b49856d5d3b941005c29e5ef312e6e1a77d3f945cfa860409f70585c455cade7d148dc66644501e31dd6e21315716a77f181d1056e8894b1f68b6e
-
SSDEEP
24576:zVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:zV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
spreview.exemfpmp.exexpsrchvw.exepid process 2684 spreview.exe 1936 mfpmp.exe 2712 xpsrchvw.exe -
Loads dropped DLL 7 IoCs
Processes:
spreview.exemfpmp.exexpsrchvw.exepid process 1204 2684 spreview.exe 1204 1936 mfpmp.exe 1204 2712 xpsrchvw.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\jhO6Ml2n4a5\\mfpmp.exe" -
Processes:
rundll32.exespreview.exemfpmp.exexpsrchvw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2836 1204 spreview.exe PID 1204 wrote to memory of 2836 1204 spreview.exe PID 1204 wrote to memory of 2836 1204 spreview.exe PID 1204 wrote to memory of 2684 1204 spreview.exe PID 1204 wrote to memory of 2684 1204 spreview.exe PID 1204 wrote to memory of 2684 1204 spreview.exe PID 1204 wrote to memory of 2980 1204 mfpmp.exe PID 1204 wrote to memory of 2980 1204 mfpmp.exe PID 1204 wrote to memory of 2980 1204 mfpmp.exe PID 1204 wrote to memory of 1936 1204 mfpmp.exe PID 1204 wrote to memory of 1936 1204 mfpmp.exe PID 1204 wrote to memory of 1936 1204 mfpmp.exe PID 1204 wrote to memory of 2772 1204 xpsrchvw.exe PID 1204 wrote to memory of 2772 1204 xpsrchvw.exe PID 1204 wrote to memory of 2772 1204 xpsrchvw.exe PID 1204 wrote to memory of 2712 1204 xpsrchvw.exe PID 1204 wrote to memory of 2712 1204 xpsrchvw.exe PID 1204 wrote to memory of 2712 1204 xpsrchvw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b2042c03f8a331856122cb3f8c1029e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2836
-
C:\Users\Admin\AppData\Local\c4zRY9m\spreview.exeC:\Users\Admin\AppData\Local\c4zRY9m\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2684
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\2w3DK\mfpmp.exeC:\Users\Admin\AppData\Local\2w3DK\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1936
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:2772
-
C:\Users\Admin\AppData\Local\e5qwa\xpsrchvw.exeC:\Users\Admin\AppData\Local\e5qwa\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2w3DK\MFPlat.DLLFilesize
1000KB
MD533848947746796a737f3d16a09ce44ea
SHA104345feb1b30b19262441e5813186ff7d5991e2f
SHA256a39f69dd87251350d4b4bfc0d8762dddaa0f729bef39985bdfdd3802833f088d
SHA51262937f5ba51a9797c42dbfb56f5c001c6e32fad25703c730595e33ea3acbc7ec9d1b5a55f3438ee73ebe93793117bd3ff1d87d35219a35ad47c0dc3a0a836122
-
C:\Users\Admin\AppData\Local\c4zRY9m\WINBRAND.dllFilesize
995KB
MD5c67905ef4a705c97b743e57ad645dc4d
SHA148f86d07625242b97fe85b8654403b50e2b9eb97
SHA2563b7544b87b9c5b0cfa8a0d74954226093cacfd35d7a392c4fb7e3db0562f4aac
SHA5120f50784b187354f1888108d117272e0973353d2f49779aa1372fba0b8235e86bdb8a463cd738d8a36553f74a2b7f797f2b9d2ac1dc2508d79f3e448d253059da
-
C:\Users\Admin\AppData\Local\e5qwa\WINMM.dllFilesize
999KB
MD5b5b92d0058e1c0475ceae2302f113936
SHA1b75c3b52dbd0f8890249f0f34300443dd67c64c4
SHA256a429a8c61212a5ecc71640b0387f26fa5003c27dda2fe2596887899c98f51b6b
SHA5123c2ec1cdf7af28ab1a15072ce176eeccd46fec7bccc93030fb12f7c6dcfb2f017ca05e573c9cb0215b9b30a780e071002695f51ca7dbc634a0c365eeb5b041f1
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mewsro.lnkFilesize
899B
MD528fb561346e57fdbc647fe241c5b0d51
SHA1bee5a24eaa2ab4cfd1a0811fb64fd96ad84679af
SHA25623c0e47abff87d5f251e0538b7e4e370d0219eee5947a2a43a87cdd54afe17cd
SHA5127b78e3ae109440d49ca55ffe7f256683b6581fb6c0f2c2c7a8c6608a16313cca5cca1babc814d547deb14bc27b084044a64bcb92431b807502d3a09e6b8bbe5a
-
\Users\Admin\AppData\Local\2w3DK\mfpmp.exeFilesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
\Users\Admin\AppData\Local\c4zRY9m\spreview.exeFilesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
\Users\Admin\AppData\Local\e5qwa\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
memory/1204-26-0x0000000076F91000-0x0000000076F92000-memory.dmpFilesize
4KB
-
memory/1204-16-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-14-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-13-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-12-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-11-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-10-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-9-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-27-0x0000000077120000-0x0000000077122000-memory.dmpFilesize
8KB
-
memory/1204-4-0x0000000076E86000-0x0000000076E87000-memory.dmpFilesize
4KB
-
memory/1204-38-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-36-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-5-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/1204-15-0x0000000002590000-0x0000000002597000-memory.dmpFilesize
28KB
-
memory/1204-25-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-73-0x0000000076E86000-0x0000000076E87000-memory.dmpFilesize
4KB
-
memory/1204-7-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1204-8-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1712-45-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1712-0-0x0000000000130000-0x0000000000137000-memory.dmpFilesize
28KB
-
memory/1712-1-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1936-74-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/1936-71-0x0000000140000000-0x0000000140100000-memory.dmpFilesize
1024KB
-
memory/1936-78-0x0000000140000000-0x0000000140100000-memory.dmpFilesize
1024KB
-
memory/2684-59-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2684-56-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/2684-53-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2712-94-0x0000000140000000-0x0000000140100000-memory.dmpFilesize
1024KB