Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
75041e080029f4260716ff47118a17c9_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
75041e080029f4260716ff47118a17c9_JaffaCakes118.dll
-
Size
994KB
-
MD5
75041e080029f4260716ff47118a17c9
-
SHA1
fdc117f6d7d18d6598fc9567ede55f1e7d8ff660
-
SHA256
c83732ddabc264f9189e924b6644cbc263292ffd804a71a6ae270cd35d271f6f
-
SHA512
0f290adb6563ef04f7201fb8291f66b234aad9509ec4b99e1d9298e394934fce9460a701f28eac75575a1cec03bc7c83084ab2dc14d079ba474b92b6368c6e64
-
SSDEEP
24576:lVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:lV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-5-0x0000000002550000-0x0000000002551000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dccw.exemsconfig.exeTpmInit.exepid process 2700 dccw.exe 1988 msconfig.exe 3016 TpmInit.exe -
Loads dropped DLL 7 IoCs
Processes:
dccw.exemsconfig.exeTpmInit.exepid process 1208 2700 dccw.exe 1208 1988 msconfig.exe 1208 3016 TpmInit.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-481678230-3773327859-3495911762-1000\\U4Ytd\\msconfig.exe" -
Processes:
rundll32.exedccw.exemsconfig.exeTpmInit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1208 wrote to memory of 2576 1208 dccw.exe PID 1208 wrote to memory of 2576 1208 dccw.exe PID 1208 wrote to memory of 2576 1208 dccw.exe PID 1208 wrote to memory of 2700 1208 dccw.exe PID 1208 wrote to memory of 2700 1208 dccw.exe PID 1208 wrote to memory of 2700 1208 dccw.exe PID 1208 wrote to memory of 2424 1208 msconfig.exe PID 1208 wrote to memory of 2424 1208 msconfig.exe PID 1208 wrote to memory of 2424 1208 msconfig.exe PID 1208 wrote to memory of 1988 1208 msconfig.exe PID 1208 wrote to memory of 1988 1208 msconfig.exe PID 1208 wrote to memory of 1988 1208 msconfig.exe PID 1208 wrote to memory of 2744 1208 TpmInit.exe PID 1208 wrote to memory of 2744 1208 TpmInit.exe PID 1208 wrote to memory of 2744 1208 TpmInit.exe PID 1208 wrote to memory of 3016 1208 TpmInit.exe PID 1208 wrote to memory of 3016 1208 TpmInit.exe PID 1208 wrote to memory of 3016 1208 TpmInit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75041e080029f4260716ff47118a17c9_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵
-
C:\Users\Admin\AppData\Local\u9Mq\dccw.exeC:\Users\Admin\AppData\Local\u9Mq\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵
-
C:\Users\Admin\AppData\Local\8hH6\msconfig.exeC:\Users\Admin\AppData\Local\8hH6\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵
-
C:\Users\Admin\AppData\Local\WZ8yL53\TpmInit.exeC:\Users\Admin\AppData\Local\WZ8yL53\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8hH6\MFC42u.dllFilesize
1022KB
MD59ce21544bfbd2c289d63a481f77ac440
SHA19ef39222d23f48950c363c588f03c6519246022b
SHA256b4ee55f723d277e5d10cf1eee576bbba825f23c295f615b579370a0425da9394
SHA512fef6f23f7cbfeca460ef8866705dbcad97339eba1fd161b944def6d7277b5ed9dc1be1acd4bd8262871febc7320dafd04462ddca0e10eb31e00a7cdb61c98ede
-
C:\Users\Admin\AppData\Local\WZ8yL53\ACTIVEDS.dllFilesize
995KB
MD50379be1cd8f2a5e416b40355e4aed1fa
SHA17c0a1d9c285d8d2f1e06a339cc0ea0aeb40a842d
SHA256ad9e2eaf6956fb133b8d6513b7601acdd07f989ff2df21927d979b5fba006662
SHA512c640d12d6fae9f9f4af598e108a314f4b90630344ecefc16f859f2317fb1f66ba5c1cddc47a278e29b82a0ec6001a93c11d30abbd694df3912b143069b1e11a4
-
C:\Users\Admin\AppData\Local\u9Mq\dccw.exeFilesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
998B
MD5fc2d5aa2114eb7cc1e61dec28b776b96
SHA1de859d6c8b9ec387f443332f695963eaa8046458
SHA256090559b5723795fdd97531bca05cacb346e26a503a540ff65a51a1b7a7f7bb7c
SHA512376d8e2dfed31bc066d0c9c28a0c3a3ba720f834aba47fad224131a18cf267322604600367cf84b20dc400665e6a33868ca00ef84b927f43a61212886e9d27a3
-
\Users\Admin\AppData\Local\8hH6\msconfig.exeFilesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
\Users\Admin\AppData\Local\WZ8yL53\TpmInit.exeFilesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d
-
\Users\Admin\AppData\Local\u9Mq\mscms.dllFilesize
998KB
MD5ba1949eb075e5081211435c95cc90915
SHA1752d6ed7b5c228a7afd8eeac063de7388109eafb
SHA25630095ede5247aab9a55ae8208c4ae9869ca793ce57d841abf30750991c7f0266
SHA512cea501d5b981cab27e970b703c286905cb711e663df9e5a9705f97716aa673e46bc97edee1a2ab564b15c8f4ec1dc25fb7f0f6a95c4735b700eae04ef234de08
-
memory/1208-37-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-77-0x0000000077A86000-0x0000000077A87000-memory.dmpFilesize
4KB
-
memory/1208-26-0x0000000077B91000-0x0000000077B92000-memory.dmpFilesize
4KB
-
memory/1208-15-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-14-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-36-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-13-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-12-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-11-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-10-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-8-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-4-0x0000000077A86000-0x0000000077A87000-memory.dmpFilesize
4KB
-
memory/1208-5-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/1208-24-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-27-0x0000000077D20000-0x0000000077D22000-memory.dmpFilesize
8KB
-
memory/1208-7-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-9-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/1208-25-0x0000000002530000-0x0000000002537000-memory.dmpFilesize
28KB
-
memory/1988-74-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/1988-78-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1988-81-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2288-45-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2288-0-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2288-3-0x00000000003A0000-0x00000000003A7000-memory.dmpFilesize
28KB
-
memory/2700-53-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2700-56-0x0000000000430000-0x0000000000437000-memory.dmpFilesize
28KB
-
memory/2700-58-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/3016-96-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/3016-99-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB