Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
7d3637031005ca4e7d31d0035afba188_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
7d3637031005ca4e7d31d0035afba188_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7d3637031005ca4e7d31d0035afba188
-
SHA1
343c4fdf5714552ee078fd09c094425c3d8b048b
-
SHA256
19c4a9564a46442c3034f30e9175124a304eff0398e72c39e739f94ac8566e2c
-
SHA512
2251467cdaaa88c8c7a8d9b61a23a098f07341bc67700492238a5ab2ba030de8243dd9815e190110075ba8ef528427bc39afd5d344abd1fecf3050036ba52f53
-
SSDEEP
24576:vyTonNVlKTt/Q5ECvVP7hpJMvjtKpvPf9+m6kLRqgSyI0:vyWRKTt/QlPVp3h9d
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1068-5-0x0000000002E50000-0x0000000002E51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
xpsrchvw.exesethc.exePresentationSettings.exepid process 2444 xpsrchvw.exe 1264 sethc.exe 2648 PresentationSettings.exe -
Loads dropped DLL 7 IoCs
Processes:
xpsrchvw.exesethc.exePresentationSettings.exepid process 1068 2444 xpsrchvw.exe 1068 1264 sethc.exe 1068 2648 PresentationSettings.exe 1068 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ydmmtcuy = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2721934792-624042501-2768869379-1000\\1pvzP\\sethc.exe" -
Processes:
sethc.exePresentationSettings.exerundll32.exexpsrchvw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2196 rundll32.exe 2196 rundll32.exe 2196 rundll32.exe 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 1068 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1068 wrote to memory of 2556 1068 xpsrchvw.exe PID 1068 wrote to memory of 2556 1068 xpsrchvw.exe PID 1068 wrote to memory of 2556 1068 xpsrchvw.exe PID 1068 wrote to memory of 2444 1068 xpsrchvw.exe PID 1068 wrote to memory of 2444 1068 xpsrchvw.exe PID 1068 wrote to memory of 2444 1068 xpsrchvw.exe PID 1068 wrote to memory of 1244 1068 sethc.exe PID 1068 wrote to memory of 1244 1068 sethc.exe PID 1068 wrote to memory of 1244 1068 sethc.exe PID 1068 wrote to memory of 1264 1068 sethc.exe PID 1068 wrote to memory of 1264 1068 sethc.exe PID 1068 wrote to memory of 1264 1068 sethc.exe PID 1068 wrote to memory of 2204 1068 PresentationSettings.exe PID 1068 wrote to memory of 2204 1068 PresentationSettings.exe PID 1068 wrote to memory of 2204 1068 PresentationSettings.exe PID 1068 wrote to memory of 2648 1068 PresentationSettings.exe PID 1068 wrote to memory of 2648 1068 PresentationSettings.exe PID 1068 wrote to memory of 2648 1068 PresentationSettings.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d3637031005ca4e7d31d0035afba188_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\QrgxnT\xpsrchvw.exeC:\Users\Admin\AppData\Local\QrgxnT\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵
-
C:\Users\Admin\AppData\Local\wwBD\sethc.exeC:\Users\Admin\AppData\Local\wwBD\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵
-
C:\Users\Admin\AppData\Local\J7nSO4O\PresentationSettings.exeC:\Users\Admin\AppData\Local\J7nSO4O\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\J7nSO4O\Secur32.dllFilesize
1.2MB
MD569e2ef77c3f76bdc7336b35e4b51bc44
SHA1368df25d49f78902b964ad6fe0fadf3861a5b0bf
SHA256e0e039f197ffa95be5eb217609a1b1c3ef371bb1723ad97564ffef77f2044b37
SHA5126b6448ed8086c2c5673a8a1ebaa8508a57cc627385d9ced11b6ba8a78bbccbc320500efcbd818ada71f2acd422903f17c9b30e2010893db219af5221a476f517
-
C:\Users\Admin\AppData\Local\QrgxnT\WINMM.dllFilesize
1.2MB
MD5a782bbdcbdc374c28f2cf82a064b6d08
SHA1b378c9df7cf494850c3c28eec3c8cc9272ba8334
SHA256ca21e7d00ddb4d07b4ec5e00ed0684868adebc2b2389a11b4891a4de464a890e
SHA5126c6c86d8ae673f90e0456e1f9fa98294a221800a9bc81045200969f0d8ac4ce9e2854506913e84e04a17a9787c0d2c25420369091ee91ea54911b54c18e288ec
-
C:\Users\Admin\AppData\Local\QrgxnT\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
C:\Users\Admin\AppData\Local\wwBD\DUI70.dllFilesize
1.4MB
MD585b6ea9d33c06fcb09482dfa1ea11d82
SHA11a98c80fe9ed061cfd1a70d86c528360aac09007
SHA256905d2fa7824b1007dd70c3ace580ba6428dc2da981885172d8232570d2b22edb
SHA512ec41a4051d4318b3f68418018214f9681274c32a73b6fc3686adc8bb09581a78d66c2f5699ccff4eab840982ea266f8eab3de81e65d5c4015804d3643bcd14c7
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Piadwmdtymfdd.lnkFilesize
1KB
MD56539356c1f116102aeb10b3d778dc296
SHA15686e816741d07e1660d539aee3a3035d68fd46f
SHA2569003052794688a767cdba1190082690cc071b33c8d8a7855334dc2e4fd3cd21c
SHA5121663ba5dbdc4dcee6111cffc636a3ee258ed5a823ef4d1b9a3e1d2a1e9a887a57489649006f22aba3d99cc364259a76fc595151cf5ae9821e717af027fa51e15
-
\Users\Admin\AppData\Local\J7nSO4O\PresentationSettings.exeFilesize
172KB
MD5a6f8d318f6041334889481b472000081
SHA1b8cf08ec17b30c8811f2514246fcdff62731dd58
SHA256208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258
SHA51260f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69
-
\Users\Admin\AppData\Local\wwBD\sethc.exeFilesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
memory/1068-28-0x0000000077860000-0x0000000077862000-memory.dmpFilesize
8KB
-
memory/1068-15-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-4-0x00000000774C6000-0x00000000774C7000-memory.dmpFilesize
4KB
-
memory/1068-27-0x00000000776D1000-0x00000000776D2000-memory.dmpFilesize
4KB
-
memory/1068-14-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-13-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-12-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-11-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-10-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-26-0x0000000002E30000-0x0000000002E37000-memory.dmpFilesize
28KB
-
memory/1068-25-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-34-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-33-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-5-0x0000000002E50000-0x0000000002E51000-memory.dmpFilesize
4KB
-
memory/1068-9-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-16-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-74-0x00000000774C6000-0x00000000774C7000-memory.dmpFilesize
4KB
-
memory/1068-8-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1068-7-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1264-75-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/1264-76-0x0000000140000000-0x0000000140165000-memory.dmpFilesize
1.4MB
-
memory/1264-81-0x0000000140000000-0x0000000140165000-memory.dmpFilesize
1.4MB
-
memory/2196-42-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/2196-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2196-0-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/2444-55-0x0000000140000000-0x0000000140133000-memory.dmpFilesize
1.2MB
-
memory/2444-50-0x0000000140000000-0x0000000140133000-memory.dmpFilesize
1.2MB
-
memory/2444-53-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2648-93-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2648-98-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB