Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
6122acd9d27d5bbb20b560bf1e1970b8_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
6122acd9d27d5bbb20b560bf1e1970b8_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
6122acd9d27d5bbb20b560bf1e1970b8
-
SHA1
db4a42934bfa843a492d63f3bb0b3d5fb4862830
-
SHA256
1450515f58f4eb0b64380065b9b90072caec6d100c51dbf049b5c1a3ee44aa5c
-
SHA512
44016421b721b59d35f87b7719610e145825b1606acad2b166ab0893190a06646d7291ccaa117e6d6f1c3e4b61b474f1efa4cc9f98e7220fc3b097e6603b240b
-
SSDEEP
24576:xVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:xV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000002E30000-0x0000000002E31000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
iexpress.exemsconfig.exepsr.exepid process 2760 iexpress.exe 1028 msconfig.exe 2484 psr.exe -
Loads dropped DLL 7 IoCs
Processes:
iexpress.exemsconfig.exepsr.exepid process 1196 2760 iexpress.exe 1196 1028 msconfig.exe 1196 2484 psr.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\9EN46O1\\msconfig.exe" -
Processes:
iexpress.exemsconfig.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2864 regsvr32.exe 2864 regsvr32.exe 2864 regsvr32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2472 1196 iexpress.exe PID 1196 wrote to memory of 2472 1196 iexpress.exe PID 1196 wrote to memory of 2472 1196 iexpress.exe PID 1196 wrote to memory of 2760 1196 iexpress.exe PID 1196 wrote to memory of 2760 1196 iexpress.exe PID 1196 wrote to memory of 2760 1196 iexpress.exe PID 1196 wrote to memory of 2924 1196 msconfig.exe PID 1196 wrote to memory of 2924 1196 msconfig.exe PID 1196 wrote to memory of 2924 1196 msconfig.exe PID 1196 wrote to memory of 1028 1196 msconfig.exe PID 1196 wrote to memory of 1028 1196 msconfig.exe PID 1196 wrote to memory of 1028 1196 msconfig.exe PID 1196 wrote to memory of 2868 1196 psr.exe PID 1196 wrote to memory of 2868 1196 psr.exe PID 1196 wrote to memory of 2868 1196 psr.exe PID 1196 wrote to memory of 2484 1196 psr.exe PID 1196 wrote to memory of 2484 1196 psr.exe PID 1196 wrote to memory of 2484 1196 psr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6122acd9d27d5bbb20b560bf1e1970b8_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵
-
C:\Users\Admin\AppData\Local\9mpZSdGVg\iexpress.exeC:\Users\Admin\AppData\Local\9mpZSdGVg\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵
-
C:\Users\Admin\AppData\Local\OIAG\msconfig.exeC:\Users\Admin\AppData\Local\OIAG\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\GWtexJ\psr.exeC:\Users\Admin\AppData\Local\GWtexJ\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9mpZSdGVg\VERSION.dllFilesize
1.3MB
MD55e499d441b92446f653cbe2261dc44f2
SHA15cb30af4543b7a6e0dc81de017b62d9677241688
SHA256ee18299aba779e8b5358301b7f0fa5214050e93d76954a4071cf14e9ee7deb0f
SHA512466c9d7abf681b28c8786e28f664e8c48bcc000147617f9da06bf67617193583beb3b29ebc2e6c735b6fe833be8c124f73aeb8db81550d3eb9d81493e8e07bb7
-
C:\Users\Admin\AppData\Local\GWtexJ\VERSION.dllFilesize
1.3MB
MD518369a072734384701d9b63de3bedd9c
SHA1a96569efabee69396911f15144481dff1d2d2518
SHA256f794f737fe9140f827995d23ca37a511fcbee0cb9f33e767cc243e3821b4831e
SHA5120832a5bb619304886fa67441d3b83759289351140b1f04d96f1bf671c4d7fe82d1eb4860391a841e172d581a63ea0425813e3231cef6a392662172e5fa0652a8
-
C:\Users\Admin\AppData\Local\OIAG\VERSION.dllFilesize
1.3MB
MD5c1eaea72782f603e12ce200e99b63c90
SHA13bb64988b21bdd1269c70272958faaaaf65798a1
SHA2561f97179a7bf4d5964509a4fc6f6ba479bd3ddc5764117583504aa92fb4588703
SHA512a57558babbdc2e57a2a2a4216ba4747041d4a91ff60ed6789fc96f1881ef0d162bfd3c8116e085c6a69137b9c67c080731a4523bac778d4dd61c9276c502b6eb
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
706B
MD5b9749c26987e2cd3b28504a757aa1f3f
SHA1af974940fc6882000142ddcce200adfd813263fc
SHA2569e8eb59053fec38e6454bf7d014194ea8a6a32bc951e62bac13d7e359bff3ce7
SHA51259213daf63022f02aa5353737c8d38edb83cc5aa24bc1659c0e5d19bbdb6ba6bea587543a154b172a673f08c8e721fb9bace986d4bd37a3b8b377b2da3bfb442
-
\Users\Admin\AppData\Local\9mpZSdGVg\iexpress.exeFilesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
\Users\Admin\AppData\Local\GWtexJ\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
\Users\Admin\AppData\Local\OIAG\msconfig.exeFilesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
memory/1028-75-0x0000000140000000-0x000000014014A000-memory.dmpFilesize
1.3MB
-
memory/1028-72-0x00000000001B0000-0x00000000001B7000-memory.dmpFilesize
28KB
-
memory/1196-16-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-30-0x0000000077800000-0x0000000077802000-memory.dmpFilesize
8KB
-
memory/1196-12-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-27-0x0000000077671000-0x0000000077672000-memory.dmpFilesize
4KB
-
memory/1196-11-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-10-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-9-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-26-0x0000000002E10000-0x0000000002E17000-memory.dmpFilesize
28KB
-
memory/1196-25-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-33-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-34-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-4-0x0000000077466000-0x0000000077467000-memory.dmpFilesize
4KB
-
memory/1196-5-0x0000000002E30000-0x0000000002E31000-memory.dmpFilesize
4KB
-
memory/1196-13-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-8-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-7-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-14-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/1196-61-0x0000000077466000-0x0000000077467000-memory.dmpFilesize
4KB
-
memory/1196-15-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2484-90-0x0000000000520000-0x0000000000527000-memory.dmpFilesize
28KB
-
memory/2484-93-0x0000000140000000-0x000000014014A000-memory.dmpFilesize
1.3MB
-
memory/2760-56-0x0000000140000000-0x000000014014A000-memory.dmpFilesize
1.3MB
-
memory/2760-50-0x0000000140000000-0x000000014014A000-memory.dmpFilesize
1.3MB
-
memory/2760-53-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2864-0-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2864-42-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2864-2-0x00000000001D0000-0x00000000001D7000-memory.dmpFilesize
28KB