Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
6a455e38d08eeb77d0b4a7114aed1d2a_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
6a455e38d08eeb77d0b4a7114aed1d2a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
6a455e38d08eeb77d0b4a7114aed1d2a
-
SHA1
1cac68762f6c3051a28acb5e7319f01048783f9f
-
SHA256
29acca7bc56a613ab6050dc39976f8dab90d3db95730dd08573dd5cba29366c6
-
SHA512
645aad07a9e27cb5defc8aa4c588393207a89e013c0bfd4756365ea8db09d15f504529b67d941b3723ccba58df2c507f940aff750b8e07021d05cee440ed7980
-
SSDEEP
24576:7uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:l9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-5-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WFS.exeSystemPropertiesRemote.exetaskmgr.exepid process 2556 WFS.exe 1700 SystemPropertiesRemote.exe 2860 taskmgr.exe -
Loads dropped DLL 7 IoCs
Processes:
WFS.exeSystemPropertiesRemote.exetaskmgr.exepid process 1256 2556 WFS.exe 1256 1700 SystemPropertiesRemote.exe 1256 2860 taskmgr.exe 1256 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\{45E326BF-F8A0-4351-9E0C-6D4A9315502F}\\gkqEy4Jn\\SystemPropertiesRemote.exe" -
Processes:
rundll32.exeWFS.exeSystemPropertiesRemote.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1712 rundll32.exe 1712 rundll32.exe 1712 rundll32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1256 wrote to memory of 2608 1256 WFS.exe PID 1256 wrote to memory of 2608 1256 WFS.exe PID 1256 wrote to memory of 2608 1256 WFS.exe PID 1256 wrote to memory of 2556 1256 WFS.exe PID 1256 wrote to memory of 2556 1256 WFS.exe PID 1256 wrote to memory of 2556 1256 WFS.exe PID 1256 wrote to memory of 2396 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 2396 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 2396 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 1700 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 1700 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 1700 1256 SystemPropertiesRemote.exe PID 1256 wrote to memory of 2748 1256 taskmgr.exe PID 1256 wrote to memory of 2748 1256 taskmgr.exe PID 1256 wrote to memory of 2748 1256 taskmgr.exe PID 1256 wrote to memory of 2860 1256 taskmgr.exe PID 1256 wrote to memory of 2860 1256 taskmgr.exe PID 1256 wrote to memory of 2860 1256 taskmgr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a455e38d08eeb77d0b4a7114aed1d2a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\hMl\WFS.exeC:\Users\Admin\AppData\Local\hMl\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\9Zfb3Qe\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\9Zfb3Qe\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\taskmgr.exeC:\Windows\system32\taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\pxOkfBRY\taskmgr.exeC:\Users\Admin\AppData\Local\pxOkfBRY\taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9Zfb3Qe\SYSDM.CPLFilesize
1.2MB
MD52a553c4da174ec84ebaeaa810e2355de
SHA174cc3a3738401f6863f7714a562e20ae373550d0
SHA256d2b0bb8db9854d65c75e50d3497dfadae5600fd0602dfc337612931ab0753358
SHA5122b5ef76dd617f0732f1ad17a1765e2a456163d4c893dbd7d07fbea0a3d890cb0580989565f0ea705be0ff7842e4294df663f1a41a295ab94f4b25afa0a4b00f2
-
C:\Users\Admin\AppData\Local\pxOkfBRY\UxTheme.dllFilesize
1.2MB
MD5a924282fa96125e60804f1854397588b
SHA1f430dc60fa7a84e2f67060fec0a208a79a6233ab
SHA256ca04738374fceb473857730f9cab9cf522b38c5a4f8bb6b00cc34d33b65b3a20
SHA512cb61f1d73e99ed5e6f2de4684f69288f872847cc54ac9bdb5a74972e09b99a50ca56b048b7a47fea2ab2f3be4db2e724f86b89e2b3b8b87630951898ac4e3174
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
1KB
MD59a80713c643fcb151555408ba8bfa081
SHA143eb89a6427091e2a480215541d615776acf636d
SHA256b23c00e4e58340208e9e877d7c3b0c87493882c79115d4e93bd6c7b12ff205fc
SHA5120ff18a0a482e1a5036dee9f77b6b5e393a5e6ad1b9f5bb95f80ac19dde3c4e337ff2257537a7d5c3e2f7990c44833134ea5ab7c07e50e26a2e90bf71bdc6eb32
-
\Users\Admin\AppData\Local\9Zfb3Qe\SystemPropertiesRemote.exeFilesize
80KB
MD5d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
\Users\Admin\AppData\Local\hMl\WFS.exeFilesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
\Users\Admin\AppData\Local\hMl\credui.dllFilesize
1.2MB
MD51ffae3b5cb517c3a7ad87fe18a9372b9
SHA1d494b7095488a7d86adb4c6c4dc228a77387c5eb
SHA256157b72e3312f0c86160aba239bdbc5c8be07845bd7957a0914e1a575675fa3e6
SHA512e9aecbc967f12078e23f0d0625a6630db2fc80f07eaf6a42625b0faf9edfa500c6f4ce11d67af48d43cb0da8c34ebe2639740c1dbdc0a58a97303af607859bca
-
\Users\Admin\AppData\Local\pxOkfBRY\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
memory/1256-27-0x0000000002A30000-0x0000000002A37000-memory.dmpFilesize
28KB
-
memory/1256-8-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-18-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-26-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-16-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-15-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-28-0x0000000077301000-0x0000000077302000-memory.dmpFilesize
4KB
-
memory/1256-13-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-12-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-11-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-9-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-4-0x00000000771F6000-0x00000000771F7000-memory.dmpFilesize
4KB
-
memory/1256-31-0x0000000077490000-0x0000000077492000-memory.dmpFilesize
8KB
-
memory/1256-39-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-38-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-5-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/1256-17-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-14-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-7-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-10-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1256-66-0x00000000771F6000-0x00000000771F7000-memory.dmpFilesize
4KB
-
memory/1700-77-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1700-80-0x000007FEF61D0000-0x000007FEF6312000-memory.dmpFilesize
1.3MB
-
memory/1712-47-0x000007FEF61D0000-0x000007FEF6311000-memory.dmpFilesize
1.3MB
-
memory/1712-1-0x000007FEF61D0000-0x000007FEF6311000-memory.dmpFilesize
1.3MB
-
memory/1712-0-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/2556-55-0x00000000003B0000-0x00000000003B7000-memory.dmpFilesize
28KB
-
memory/2556-56-0x000007FEF61D0000-0x000007FEF6312000-memory.dmpFilesize
1.3MB
-
memory/2556-61-0x000007FEF61D0000-0x000007FEF6312000-memory.dmpFilesize
1.3MB
-
memory/2860-92-0x0000000000130000-0x0000000000137000-memory.dmpFilesize
28KB
-
memory/2860-98-0x000007FEF61D0000-0x000007FEF6312000-memory.dmpFilesize
1.3MB