Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
5d854e90c9ce59c4a156aa7818aec934_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
5d854e90c9ce59c4a156aa7818aec934_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
5d854e90c9ce59c4a156aa7818aec934
-
SHA1
8ea2082c93e1bd69b654750b324ca6441874231b
-
SHA256
6ee00d8356339095b8dcc714a2b6c5bc438ca13a0b292963918b2702cdd5e75a
-
SHA512
7d39f53fa199f5ed6a440d3418b489a268884e355e012b132d25914dbb52d586d048f298a5bde3749661006a050ec1330adb2ecf6819dcb22a640892f7786806
-
SSDEEP
24576:yuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:a9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1124-5-0x0000000002D40000-0x0000000002D41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exerstrui.exemblctr.exepid process 2476 Utilman.exe 1636 rstrui.exe 1564 mblctr.exe -
Loads dropped DLL 7 IoCs
Processes:
Utilman.exerstrui.exemblctr.exepid process 1124 2476 Utilman.exe 1124 1636 rstrui.exe 1124 1564 mblctr.exe 1124 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\NETWOR~1\\PVVIAU~1\\rstrui.exe" -
Processes:
rundll32.exeUtilman.exerstrui.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1124 wrote to memory of 2608 1124 Utilman.exe PID 1124 wrote to memory of 2608 1124 Utilman.exe PID 1124 wrote to memory of 2608 1124 Utilman.exe PID 1124 wrote to memory of 2476 1124 Utilman.exe PID 1124 wrote to memory of 2476 1124 Utilman.exe PID 1124 wrote to memory of 2476 1124 Utilman.exe PID 1124 wrote to memory of 1572 1124 rstrui.exe PID 1124 wrote to memory of 1572 1124 rstrui.exe PID 1124 wrote to memory of 1572 1124 rstrui.exe PID 1124 wrote to memory of 1636 1124 rstrui.exe PID 1124 wrote to memory of 1636 1124 rstrui.exe PID 1124 wrote to memory of 1636 1124 rstrui.exe PID 1124 wrote to memory of 2748 1124 mblctr.exe PID 1124 wrote to memory of 2748 1124 mblctr.exe PID 1124 wrote to memory of 2748 1124 mblctr.exe PID 1124 wrote to memory of 1564 1124 mblctr.exe PID 1124 wrote to memory of 1564 1124 mblctr.exe PID 1124 wrote to memory of 1564 1124 mblctr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5d854e90c9ce59c4a156aa7818aec934_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵PID:2608
-
C:\Users\Admin\AppData\Local\63or\Utilman.exeC:\Users\Admin\AppData\Local\63or\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2476
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:1572
-
C:\Users\Admin\AppData\Local\ZvOR7Ui\rstrui.exeC:\Users\Admin\AppData\Local\ZvOR7Ui\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1636
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:2748
-
C:\Users\Admin\AppData\Local\e8sz\mblctr.exeC:\Users\Admin\AppData\Local\e8sz\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5c3ed61544fc63cff52bf97cb17ffa737
SHA11ff6949f6d5028c58e5a932235fd9bf5be5293f3
SHA256e0cd56ef994028638fb35921341164fee47c8895fbec3bdb1ae97b3b07b98ef7
SHA51294525e23b70ce1c0c6efe148284888e6a55f1d4de82b96a9d06a7d86292bc1d30b3475cdf5c36689fa56ce89f437706b97377b2484a76f372776f4e1dcd1efb2
-
Filesize
1.4MB
MD525afd011b02ad5893dab23cdb45138a3
SHA16ef80f4a1a10071483e8524e79229e80f4f0b288
SHA25684e88136aa07c026bc679afd54e848bc2776f8ed1552d43dae784e0b42d1494e
SHA51232bb538bca481bbc02fe368860f29e579f690c4916b5a86ba922564b777ef9d03e3b688487ea11babc0d3af5d6391c9e242fb6375d57fc926df68f32458297ce
-
Filesize
1.4MB
MD578e539b423a54cac5ff2b0eaa320dcf4
SHA18b2533d722da0e278087921c6070b1e3a9e68994
SHA256b4f9cef4c734981fb5e9b22df0d589d396ff718b9b921624aefb5da9d00480d1
SHA512eb31f9d3835f07d07617fadb8fe07d4bcb0f401208031038dbb51fd44d206fc59d0bc69ed6208b43230dc826aee74579b14c8c8bf501da0da8e948d2f3080855
-
Filesize
1KB
MD5056889fdd85f07dca16b0f27d54f0a9e
SHA1aa34522e70b61d2619bf03a05b6a7a9ccfc886fe
SHA2560b2c883b73ae1e439cccc86facf49a5ffb50cf08d7739526f0a765a0f7a3f302
SHA512323cc1048d664c3ef160d1310fe7248bba621ff3ebffdb94ed32440b6e6359cea6fa1905fc91503a7959c84351746c5c8a06ebc9f7c43b088c8090e1d83b7098
-
Filesize
1.3MB
MD532c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55