Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll
-
Size
994KB
-
MD5
54af4213db5f39efc01549040d6bd451
-
SHA1
0d8faf654805116aba476def35902b5c4f9ac363
-
SHA256
5af0a2900c62e7719bab11ff2e1b919266722b295b68e36c7112d036cc15afb5
-
SHA512
8e3608df45d882c57400e9f1497a8f9e9be57a519626ff72c28c40c7833c915beb5544b06f4b34217b3c0c0f7b2696bbf72ff78a7182a3e7247ee81055b57b4d
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1368-5-0x0000000002B10000-0x0000000002B11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sigverif.exerecdisc.exeSystemPropertiesPerformance.exepid process 2532 sigverif.exe 2516 recdisc.exe 3008 SystemPropertiesPerformance.exe -
Loads dropped DLL 7 IoCs
Processes:
sigverif.exerecdisc.exeSystemPropertiesPerformance.exepid process 1368 2532 sigverif.exe 1368 2516 recdisc.exe 1368 3008 SystemPropertiesPerformance.exe 1368 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\MbW76iV\\recdisc.exe" -
Processes:
rundll32.exesigverif.exerecdisc.exeSystemPropertiesPerformance.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1152 rundll32.exe 1152 rundll32.exe 1152 rundll32.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1368 wrote to memory of 2640 1368 sigverif.exe PID 1368 wrote to memory of 2640 1368 sigverif.exe PID 1368 wrote to memory of 2640 1368 sigverif.exe PID 1368 wrote to memory of 2532 1368 sigverif.exe PID 1368 wrote to memory of 2532 1368 sigverif.exe PID 1368 wrote to memory of 2532 1368 sigverif.exe PID 1368 wrote to memory of 2676 1368 recdisc.exe PID 1368 wrote to memory of 2676 1368 recdisc.exe PID 1368 wrote to memory of 2676 1368 recdisc.exe PID 1368 wrote to memory of 2516 1368 recdisc.exe PID 1368 wrote to memory of 2516 1368 recdisc.exe PID 1368 wrote to memory of 2516 1368 recdisc.exe PID 1368 wrote to memory of 2848 1368 SystemPropertiesPerformance.exe PID 1368 wrote to memory of 2848 1368 SystemPropertiesPerformance.exe PID 1368 wrote to memory of 2848 1368 SystemPropertiesPerformance.exe PID 1368 wrote to memory of 3008 1368 SystemPropertiesPerformance.exe PID 1368 wrote to memory of 3008 1368 SystemPropertiesPerformance.exe PID 1368 wrote to memory of 3008 1368 SystemPropertiesPerformance.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54af4213db5f39efc01549040d6bd451_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\rEWC6Yq\sigverif.exeC:\Users\Admin\AppData\Local\rEWC6Yq\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵
-
C:\Users\Admin\AppData\Local\JN6\recdisc.exeC:\Users\Admin\AppData\Local\JN6\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵
-
C:\Users\Admin\AppData\Local\SlJ\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\SlJ\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\JN6\SPP.dllFilesize
994KB
MD5ba80b2a55a9b87658c7a0690a7cea9ff
SHA18468d992dbbc06262dd97361d7ec9b933c9e64c0
SHA2564aafcc83276426bc375f1cfe6f9a450f1dfdccd95cb4b29935da5f79bc86f832
SHA51288244b3601e4ffb2bc1c541ec84f6ca78176b0393f2a8fa4c8b3ac6e7da59875b5f1c10f034574e0bbd20b46347c120f7d82e828cdc2a88bbb92480b3c80e340
-
C:\Users\Admin\AppData\Local\SlJ\SYSDM.CPLFilesize
994KB
MD576018ca0d005d923493cc4027b0b908d
SHA1ca296a598698021d631ef72e36901562fa4ae6e9
SHA256fd665b3cf7e7abc3b4911a6e6acd69c665dc78dd0c470c5288900fcc93b37c82
SHA51291c4b02b8851b80a21aad9639cbf1df81569dcbb0d25c0c79d067cfe6dbcc3e0769fff8598adb9482281817c9e49e3130b6b1f3844cb6fcc8a94d13adce66638
-
C:\Users\Admin\AppData\Local\rEWC6Yq\VERSION.dllFilesize
994KB
MD5d9d44294818b9a9ebd8cfc3d1f8f22e8
SHA16b1bd72fb66fceec6fc54cd59b67dc6e70eb31e9
SHA25602197eb039599d15f31273d9f5b98abfe5f86c8b9af1a19f49f796de2bb2582c
SHA51297b43ac4e762413e1fa7c92f300e2555960bac3a3208e39198fffdb7de9642509f2137716b72cf58e3945933451af02a161106d2effaf8b04e02b4fddf2626fd
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD5f410f8dad0d30de4055405a2e9c0a4a0
SHA1d069c2737600b1af1209f87307f996aa0b8744dc
SHA25623b7c36f87420ee3850f40940cabc4e2db7cdc89fea0dd62c815b463355eacb6
SHA512001e0a887303e5edf366ed086ce7b8523cd4a2037d1c77a6c745010c4545a3d56c867b844dbe1a667823e7a8a28283aecb02a4a7b426ec963be9d6d3b0e98318
-
\Users\Admin\AppData\Local\JN6\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
\Users\Admin\AppData\Local\SlJ\SystemPropertiesPerformance.exeFilesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72
-
\Users\Admin\AppData\Local\rEWC6Yq\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
memory/1152-38-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-1-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1152-0-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/1368-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-64-0x0000000077A66000-0x0000000077A67000-memory.dmpFilesize
4KB
-
memory/1368-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-29-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-28-0x0000000077D00000-0x0000000077D02000-memory.dmpFilesize
8KB
-
memory/1368-30-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-27-0x0000000077B71000-0x0000000077B72000-memory.dmpFilesize
4KB
-
memory/1368-24-0x0000000002230000-0x0000000002237000-memory.dmpFilesize
28KB
-
memory/1368-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-23-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-4-0x0000000077A66000-0x0000000077A67000-memory.dmpFilesize
4KB
-
memory/1368-5-0x0000000002B10000-0x0000000002B11000-memory.dmpFilesize
4KB
-
memory/1368-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1368-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2516-70-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2532-50-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2532-47-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2532-46-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/3008-82-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/3008-88-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB