Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
803482d842575c5bcb8cd5082d09f034_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
803482d842575c5bcb8cd5082d09f034_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
803482d842575c5bcb8cd5082d09f034
-
SHA1
b84814b784597703a722edc11563e49dc0c16515
-
SHA256
dc8f78c6a53282cabb3e927485a34e2dcf018d3493baf07635cac74cb908ba39
-
SHA512
4e7303b8bbbd09ae8c41f3899a29c437c96931fda762d380dceb4156c168bdb9ce66533720a7dadb9802039cb79e5fd18b34fbf99ff18ab9477ca0c9fdf4b121
-
SSDEEP
24576:NyTonNVlKTt/Q5ECvVP7hpJMvjtKpvPf9+m6kLRqgSyI:NyWRKTt/QlPVp3h9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1172-5-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
isoburn.exemsinfo32.exedwm.exepid process 2544 isoburn.exe 2768 msinfo32.exe 1860 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
isoburn.exemsinfo32.exedwm.exepid process 1172 2544 isoburn.exe 1172 2768 msinfo32.exe 1172 1860 dwm.exe 1172 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\Xf1FXGB\\msinfo32.exe" -
Processes:
rundll32.exeisoburn.exemsinfo32.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1884 rundll32.exe 1884 rundll32.exe 1884 rundll32.exe 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 1172 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1172 wrote to memory of 2504 1172 isoburn.exe PID 1172 wrote to memory of 2504 1172 isoburn.exe PID 1172 wrote to memory of 2504 1172 isoburn.exe PID 1172 wrote to memory of 2544 1172 isoburn.exe PID 1172 wrote to memory of 2544 1172 isoburn.exe PID 1172 wrote to memory of 2544 1172 isoburn.exe PID 1172 wrote to memory of 2780 1172 msinfo32.exe PID 1172 wrote to memory of 2780 1172 msinfo32.exe PID 1172 wrote to memory of 2780 1172 msinfo32.exe PID 1172 wrote to memory of 2768 1172 msinfo32.exe PID 1172 wrote to memory of 2768 1172 msinfo32.exe PID 1172 wrote to memory of 2768 1172 msinfo32.exe PID 1172 wrote to memory of 300 1172 dwm.exe PID 1172 wrote to memory of 300 1172 dwm.exe PID 1172 wrote to memory of 300 1172 dwm.exe PID 1172 wrote to memory of 1860 1172 dwm.exe PID 1172 wrote to memory of 1860 1172 dwm.exe PID 1172 wrote to memory of 1860 1172 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\803482d842575c5bcb8cd5082d09f034_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵
-
C:\Users\Admin\AppData\Local\EftBOp\isoburn.exeC:\Users\Admin\AppData\Local\EftBOp\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵
-
C:\Users\Admin\AppData\Local\Ga7IKLZ\msinfo32.exeC:\Users\Admin\AppData\Local\Ga7IKLZ\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵
-
C:\Users\Admin\AppData\Local\kBqse\dwm.exeC:\Users\Admin\AppData\Local\kBqse\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\EftBOp\UxTheme.dllFilesize
1.2MB
MD550ff27122f33560660387b05bd68cf34
SHA1f49eb0e91c82918d9c71b81a382f07f45bb10e03
SHA25659c16059e6820c7a772f0a7d4cbf8ddef0c3480e49ebb5e3553478753b36b7dc
SHA5128435222af50bf112d5e560583a0a5f3736f78829873c8ef98a55c00f5fbfd4ec132f026719626be3cfef3014ffa509ee77dc624c6bf996eab3940fadc0680fd9
-
C:\Users\Admin\AppData\Local\EftBOp\isoburn.exeFilesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa
-
C:\Users\Admin\AppData\Local\Ga7IKLZ\MFC42u.dllFilesize
1.3MB
MD5c27aa0e16e693d8de781a8fa411b30b0
SHA17cfdcf8ee1b81948f420648fa9b366f871677a34
SHA256cb4c280d3cc01340fb32d2877d9a6dcab13710c7aeb544d8f4f916e1804a37ea
SHA512f8fa771017d0935f20ea0982114ea5e7fd7339f330b185614ee4b6381115607d5ec651107dd2896c34a83cb77a7d7b88537e1a757df9f73ce6e1af925acd3d38
-
C:\Users\Admin\AppData\Local\Ga7IKLZ\msinfo32.exeFilesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b
-
C:\Users\Admin\AppData\Local\kBqse\UxTheme.dllFilesize
1.2MB
MD580a3a9d8c510548485384928c3c20df7
SHA1873d2887acc1f217b5863925abe4aeecc695443d
SHA25611e4ce6f73a2e3a364e7c4b8c7d766caee8b99e1763b95dc3d50377fe386438a
SHA512dfc70dbcf57aa35d98c1ee02d0b1ad577dea78bff8b59ab885df45091c4d54bd0d098410db2c962cb28910edc78b75a2b0451015b6e2e9e6981827ab7de5ebcc
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
1KB
MD5ca4419a8f351b4fe6b404b06e03339b5
SHA1c2f7403cc85af26181faecda8c279bba356c5a61
SHA256856057c0722a1e16d2fcced0e765dcf32d2f296c55c76af9d1c3458261cf2fd2
SHA5126d4ac0892fe7aca1de543547dd2e933a99e3dde6d96a1bd6543217ad020276c591edba265372be575e253e77e7cce50f3bc273aa29ed8967f4628e79674acf26
-
\Users\Admin\AppData\Local\kBqse\dwm.exeFilesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
memory/1172-10-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-14-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-27-0x0000000076FF0000-0x0000000076FF2000-memory.dmpFilesize
8KB
-
memory/1172-24-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-26-0x0000000076E61000-0x0000000076E62000-memory.dmpFilesize
4KB
-
memory/1172-25-0x0000000002DC0000-0x0000000002DC7000-memory.dmpFilesize
28KB
-
memory/1172-15-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-12-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-11-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-4-0x0000000076C56000-0x0000000076C57000-memory.dmpFilesize
4KB
-
memory/1172-37-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-36-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-5-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB
-
memory/1172-13-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-8-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-74-0x0000000076C56000-0x0000000076C57000-memory.dmpFilesize
4KB
-
memory/1172-7-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1172-9-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1860-93-0x0000000000320000-0x0000000000327000-memory.dmpFilesize
28KB
-
memory/1860-94-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1884-45-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1884-0-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1884-1-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2544-59-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2544-54-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2544-53-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2768-71-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/2768-77-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB