Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll
-
Size
987KB
-
MD5
805cfbdf86f0b96d764ec4d94cf2360c
-
SHA1
135e15ca1b80483e83e016dbcb11ba64dd289b7e
-
SHA256
976e368f1c88cbaa179d651e604ec02dc14db5548b5051c9a70de81b1c41a600
-
SHA512
992432c661273be9c0f7ad6e9568f5b892e8d6626c99347b31bb39f02e4acfe1bac47d63a7e20e8459e76840c26187c385bb6e1c88f350146e2bff6d1d3c6045
-
SSDEEP
24576:4VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:4V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1144-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dpnsvr.exerekeywiz.exenotepad.exepid process 2652 dpnsvr.exe 1604 rekeywiz.exe 544 notepad.exe -
Loads dropped DLL 7 IoCs
Processes:
dpnsvr.exerekeywiz.exenotepad.exepid process 1144 2652 dpnsvr.exe 1144 1604 rekeywiz.exe 1144 544 notepad.exe 1144 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ybhspkdtbke = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\PrivacIE\\Ka1wz\\rekeywiz.exe" -
Processes:
rundll32.exedpnsvr.exerekeywiz.exenotepad.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 1144 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1144 wrote to memory of 2548 1144 dpnsvr.exe PID 1144 wrote to memory of 2548 1144 dpnsvr.exe PID 1144 wrote to memory of 2548 1144 dpnsvr.exe PID 1144 wrote to memory of 2652 1144 dpnsvr.exe PID 1144 wrote to memory of 2652 1144 dpnsvr.exe PID 1144 wrote to memory of 2652 1144 dpnsvr.exe PID 1144 wrote to memory of 1716 1144 rekeywiz.exe PID 1144 wrote to memory of 1716 1144 rekeywiz.exe PID 1144 wrote to memory of 1716 1144 rekeywiz.exe PID 1144 wrote to memory of 1604 1144 rekeywiz.exe PID 1144 wrote to memory of 1604 1144 rekeywiz.exe PID 1144 wrote to memory of 1604 1144 rekeywiz.exe PID 1144 wrote to memory of 2624 1144 notepad.exe PID 1144 wrote to memory of 2624 1144 notepad.exe PID 1144 wrote to memory of 2624 1144 notepad.exe PID 1144 wrote to memory of 544 1144 notepad.exe PID 1144 wrote to memory of 544 1144 notepad.exe PID 1144 wrote to memory of 544 1144 notepad.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\805cfbdf86f0b96d764ec4d94cf2360c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵
-
C:\Users\Admin\AppData\Local\Iee5B\dpnsvr.exeC:\Users\Admin\AppData\Local\Iee5B\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵
-
C:\Users\Admin\AppData\Local\kGmJ9H\rekeywiz.exeC:\Users\Admin\AppData\Local\kGmJ9H\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\rkoy5cRxb\notepad.exeC:\Users\Admin\AppData\Local\rkoy5cRxb\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Iee5B\WINMM.dllFilesize
992KB
MD5c148c2f59b1ade826509c57ad1cd65c6
SHA1cf7ec96df02eb1f8ec23e60a184203d3876d7ce6
SHA25672a6ed7109dcfefee563c6f09fd4f22be99a6291152db251885e325461470550
SHA512c01c8cb662554e52900e22950d056651433ab6d05b32fedaf3bbdf4539961d3ac1e62574722322b35c412789cb5b3874fcf19ba114ad76331bfa39f488ed1e28
-
C:\Users\Admin\AppData\Local\kGmJ9H\slc.dllFilesize
988KB
MD5c510d8d5bf4dd0fd39e0a75609eb198c
SHA1ac936f8394d9042b96787fb154cc816ed4deb78f
SHA25653bbe818e0d150e73402f3d094777512374d75bfb02f795bcb4ad383819138c4
SHA512a03cee18f0f51f261ac9c911c96f85916795ca04e847c12dc000935f934b7a8ba6c47979baf0e42956cce684cd07dbf746d650d88be402b94d5b24b23cb463d9
-
C:\Users\Admin\AppData\Local\rkoy5cRxb\VERSION.dllFilesize
987KB
MD562c68da80cb405e44f12a51c85d1b205
SHA1115f1a6966229e38d4747eff9cccc17400487812
SHA2569f16570e5b564b1a4e84b13071c40b95e159295098c828d1559488c088451b01
SHA51204b1b7835a7a3bebd1356ae12940069901ac358d532518d00640500dfc381198eee4413de6ec89992ca3024040ee95ecb98e27b2a0e31028503d50d73bec75b3
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Tkjddllshxzvy.lnkFilesize
964B
MD5497e3765eec13f0d85a9972e89176276
SHA14d291f548339fbc40de7d2c8adf5272a53ac135e
SHA256b6144847a76b7a27480463bf7c75051c17bd588a39bc9bb497cd46f9c3a6d9a4
SHA512dd80f9de0f29ed417ccbca185838e76304acc78aeb8c53af8c4d2d90b27709ba7f43a9dde811dd6ccabf23a587d87f6fed799e71fc8b6882c71db39019ed58bc
-
\Users\Admin\AppData\Local\Iee5B\dpnsvr.exeFilesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b
-
\Users\Admin\AppData\Local\kGmJ9H\rekeywiz.exeFilesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
\Users\Admin\AppData\Local\rkoy5cRxb\notepad.exeFilesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
memory/544-95-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/544-89-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/1144-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-4-0x0000000077506000-0x0000000077507000-memory.dmpFilesize
4KB
-
memory/1144-26-0x00000000778A0000-0x00000000778A2000-memory.dmpFilesize
8KB
-
memory/1144-25-0x0000000077711000-0x0000000077712000-memory.dmpFilesize
4KB
-
memory/1144-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-24-0x0000000002DB0000-0x0000000002DB7000-memory.dmpFilesize
28KB
-
memory/1144-38-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmpFilesize
4KB
-
memory/1144-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1144-63-0x0000000077506000-0x0000000077507000-memory.dmpFilesize
4KB
-
memory/1144-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1604-71-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1604-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1604-74-0x0000000000200000-0x0000000000207000-memory.dmpFilesize
28KB
-
memory/1948-0-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/1948-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1948-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2652-58-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2652-55-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2652-52-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB