Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
72608747a45a7319e8a366c80c12b5f1_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
72608747a45a7319e8a366c80c12b5f1_JaffaCakes118.dll
-
Size
992KB
-
MD5
72608747a45a7319e8a366c80c12b5f1
-
SHA1
211042d8e9ba7565645574feaef38139f279b517
-
SHA256
46c447cd6bab5cf7dc2a900f657f9c7757b531ebe05e186f7d0770f8f8319e3c
-
SHA512
13147d62893262189621788d4de4ed4b35ff2b9e5e2f36bfcd46aa8b0f4ff3eb78b1637d0028398a0b80c1b8ef816f832d9bc6cf445986b1ff243c7ab100d2e4
-
SSDEEP
24576:NVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:NV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exemsdt.exemsinfo32.exepid process 2664 SystemPropertiesDataExecutionPrevention.exe 2556 msdt.exe 1512 msinfo32.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exemsdt.exemsinfo32.exepid process 1184 2664 SystemPropertiesDataExecutionPrevention.exe 1184 2556 msdt.exe 1184 1512 msinfo32.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gdussggr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\ZJUQp62pB9X\\msdt.exe" -
Processes:
rundll32.exeSystemPropertiesDataExecutionPrevention.exemsdt.exemsinfo32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1960 rundll32.exe 1960 rundll32.exe 1960 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1184 wrote to memory of 2784 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2784 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2784 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2664 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2664 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2664 1184 SystemPropertiesDataExecutionPrevention.exe PID 1184 wrote to memory of 2516 1184 msdt.exe PID 1184 wrote to memory of 2516 1184 msdt.exe PID 1184 wrote to memory of 2516 1184 msdt.exe PID 1184 wrote to memory of 2556 1184 msdt.exe PID 1184 wrote to memory of 2556 1184 msdt.exe PID 1184 wrote to memory of 2556 1184 msdt.exe PID 1184 wrote to memory of 1628 1184 msinfo32.exe PID 1184 wrote to memory of 1628 1184 msinfo32.exe PID 1184 wrote to memory of 1628 1184 msinfo32.exe PID 1184 wrote to memory of 1512 1184 msinfo32.exe PID 1184 wrote to memory of 1512 1184 msinfo32.exe PID 1184 wrote to memory of 1512 1184 msinfo32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72608747a45a7319e8a366c80c12b5f1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:2784
-
C:\Users\Admin\AppData\Local\P72XHGR\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\P72XHGR\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2664
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2516
-
C:\Users\Admin\AppData\Local\YYAQHw4U\msdt.exeC:\Users\Admin\AppData\Local\YYAQHw4U\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2556
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:1628
-
C:\Users\Admin\AppData\Local\KlZItu0\msinfo32.exeC:\Users\Admin\AppData\Local\KlZItu0\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\YYAQHw4U\DUser.dllFilesize
995KB
MD5f33cc6f7ac62331dcfdca59ff476ab92
SHA13c0c1a24dddf07bf906f39745553c1ca0b2fa8f1
SHA256f75e24a9b708cf997b6228419b2d50dbf5e2607ffa3d725b78d96adf2ac32699
SHA51233364e590c5957add796ae3f1fc654141d2b37710e2d9636544c53a1ee3c96fae2633151b6168b1a572470fe3331081697707997af4c977295699d10c65f367b
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Smfbypnq.lnkFilesize
1KB
MD5318aae46697032c752ce6aa80b39a274
SHA183b1f53eae0bd1e560e0804eb7caab7c72c0ff78
SHA25665b0865dda739a01c51530e6bb84c664323de2d4ccceb1d0dfe3e3647af50e79
SHA512cac161c0dfc69c4fe50b9ac02653500390fbdbdfe1ef1a27173321be491f3b9457a05b794ca1fdc1fe264db58fe4de610ab72e788501ee3183aec3d46d0e7eaf
-
\Users\Admin\AppData\Local\KlZItu0\MFC42u.dllFilesize
1019KB
MD512d14c83046106316b9b645f03e4d12d
SHA1fe9bbb1081333aeaf80007a4af27367847f9d549
SHA256cfa773e8ea0fe2716a892f64e24a308c1def5585054b2a896a316c95089757c7
SHA5128383b8d93f25c429952008b580697c488dce71f478fbecccaa223d7942685845fef4c89e56a2456e7e3bfa4e5743eb173744ab4cea624306736da0a23213cc6d
-
\Users\Admin\AppData\Local\KlZItu0\msinfo32.exeFilesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b
-
\Users\Admin\AppData\Local\P72XHGR\SYSDM.CPLFilesize
992KB
MD520a683e5a0c7dbcce19190e9bc44abab
SHA1f8eb07df192da4952bed72c12031f512dc9f9b3c
SHA256a9a7213d9a8e5f8f6303922d243e7a53372d548b56dc8557d9152d6f7543ce41
SHA51273b81c44e5d0f1abe34cf22af5f121873b909194b66a29b1acb297ad27840915f619ac3f83f740107a11870bd6ac2bd2b377e628f29bcd2d959f37a3ccfef892
-
\Users\Admin\AppData\Local\P72XHGR\SystemPropertiesDataExecutionPrevention.exeFilesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
\Users\Admin\AppData\Local\YYAQHw4U\msdt.exeFilesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
memory/1184-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-19-0x0000000002DB0000-0x0000000002DB7000-memory.dmpFilesize
28KB
-
memory/1184-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-26-0x0000000077320000-0x0000000077322000-memory.dmpFilesize
8KB
-
memory/1184-25-0x0000000077191000-0x0000000077192000-memory.dmpFilesize
4KB
-
memory/1184-24-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-4-0x0000000077086000-0x0000000077087000-memory.dmpFilesize
4KB
-
memory/1184-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmpFilesize
4KB
-
memory/1184-72-0x0000000077086000-0x0000000077087000-memory.dmpFilesize
4KB
-
memory/1184-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1184-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1512-87-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1512-90-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/1512-93-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1960-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1960-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1960-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2556-75-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2664-57-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2664-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB