Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
88bf0cec0a0950513347f76e77b77f06_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
88bf0cec0a0950513347f76e77b77f06_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
88bf0cec0a0950513347f76e77b77f06
-
SHA1
5109dea79b1e2bb2086e1fda0cfb197ac78e90b5
-
SHA256
331b081d4f8a8c846b6f54ed1309c8b13802449ae5a412bacdd1beb40d032835
-
SHA512
0f4bd97642aa68d69154d8e5f42c00e2c0bb4c96877397dca25b6c7c473771e51e558df007812bc8e994614e3ce238309e5b9141cfa3def4d554acf9ef0659ce
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1212-5-0x00000000029A0000-0x00000000029A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
RDVGHelper.exeslui.exetabcal.exepid process 572 RDVGHelper.exe 1540 slui.exe 2472 tabcal.exe -
Loads dropped DLL 7 IoCs
Processes:
RDVGHelper.exeslui.exetabcal.exepid process 1212 572 RDVGHelper.exe 1212 1540 slui.exe 1212 2472 tabcal.exe 1212 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\5n74hdJ\\slui.exe" -
Processes:
tabcal.exerundll32.exeRDVGHelper.exeslui.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2336 rundll32.exe 2336 rundll32.exe 2336 rundll32.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1212 wrote to memory of 1984 1212 RDVGHelper.exe PID 1212 wrote to memory of 1984 1212 RDVGHelper.exe PID 1212 wrote to memory of 1984 1212 RDVGHelper.exe PID 1212 wrote to memory of 572 1212 RDVGHelper.exe PID 1212 wrote to memory of 572 1212 RDVGHelper.exe PID 1212 wrote to memory of 572 1212 RDVGHelper.exe PID 1212 wrote to memory of 2408 1212 slui.exe PID 1212 wrote to memory of 2408 1212 slui.exe PID 1212 wrote to memory of 2408 1212 slui.exe PID 1212 wrote to memory of 1540 1212 slui.exe PID 1212 wrote to memory of 1540 1212 slui.exe PID 1212 wrote to memory of 1540 1212 slui.exe PID 1212 wrote to memory of 2480 1212 tabcal.exe PID 1212 wrote to memory of 2480 1212 tabcal.exe PID 1212 wrote to memory of 2480 1212 tabcal.exe PID 1212 wrote to memory of 2472 1212 tabcal.exe PID 1212 wrote to memory of 2472 1212 tabcal.exe PID 1212 wrote to memory of 2472 1212 tabcal.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\88bf0cec0a0950513347f76e77b77f06_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:1984
-
C:\Users\Admin\AppData\Local\ZDijXXZ\RDVGHelper.exeC:\Users\Admin\AppData\Local\ZDijXXZ\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:572
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2408
-
C:\Users\Admin\AppData\Local\K4hE\slui.exeC:\Users\Admin\AppData\Local\K4hE\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1540
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:2480
-
C:\Users\Admin\AppData\Local\jCS4qq0a\tabcal.exeC:\Users\Admin\AppData\Local\jCS4qq0a\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\K4hE\slc.dllFilesize
1.2MB
MD522fd107cfad7c9c0078a4ece322b70f3
SHA114662bd85d0e9f78aeee83933c0e2337a8b78266
SHA2562a2b6f0e887ae97b8991158804d0a76508fa7c5675276b7a9b292f584f93010d
SHA51201fe99a338f37aa3895397ce9bf95dd8eb90ce5c4cd299c272648366b93584fcb2ad76e79c9ac9ee1b3a763e282d64be023586d303e4b460817bf0c44508a32a
-
C:\Users\Admin\AppData\Local\K4hE\slui.exeFilesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
C:\Users\Admin\AppData\Local\ZDijXXZ\dwmapi.dllFilesize
1.2MB
MD58d2fdb95aa09ca41cc5a0310d6e06a3d
SHA1164127cfbdab4498690d15ab59ae87994ddc5bb5
SHA256b9cd027075c4afa610b49d1c5526d5cd054779348a0bcad744ca0016559dd7c0
SHA512381624a05ed0a3bcf2fea92b15be54081d437efcdeae42be2cc28f80260cb346633bf3dc28f7c1c05ff9704a1a9fa621c74dc3ddd38223ffafcfead20e18441a
-
C:\Users\Admin\AppData\Local\jCS4qq0a\tabcal.exeFilesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD577bae22bf69bd3abc4b59e9bd9df35fc
SHA1303f4963656a3111c75d66e050b5c88035a01b12
SHA256d164b630bbf15762a6bd007c9c9bdc8d8289fec8afc8d2cce5a203ee597b95e5
SHA51288401df31e0a8c1efb650620f65d4f944ac3831e3e8b863f3a301157fb9c3dfc98d0cb176bd008bd9133a0cca37d9471a9e02e9c1dffe71e6acfeec37836e99a
-
\Users\Admin\AppData\Local\ZDijXXZ\RDVGHelper.exeFilesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
\Users\Admin\AppData\Local\jCS4qq0a\HID.DLLFilesize
1.2MB
MD51be3d0bd3c4e1ea1ed8b46cbd1db19ce
SHA1972b13443e4b90062fea3be1134773df7ad8d51a
SHA256484fa9482382c948bb99df4cfca3933525682b5c421d87c20f3ce1ed6f2ea3ed
SHA512fbddd3744a8041830415efdd00062ac8f8102ef177a04d7057088c9d796fb13ac2279d226bf6adb6e23dc50d6b2f39bef7751d6f5af5807c6837c893697e3e8e
-
memory/572-61-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/572-56-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/572-55-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1212-15-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-54-0x0000000077AE6000-0x0000000077AE7000-memory.dmpFilesize
4KB
-
memory/1212-11-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-10-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-9-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-8-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-27-0x0000000077CF1000-0x0000000077CF2000-memory.dmpFilesize
4KB
-
memory/1212-28-0x0000000077E80000-0x0000000077E82000-memory.dmpFilesize
8KB
-
memory/1212-38-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-37-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-4-0x0000000077AE6000-0x0000000077AE7000-memory.dmpFilesize
4KB
-
memory/1212-13-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-14-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-12-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-5-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/1212-25-0x0000000001C60000-0x0000000001C67000-memory.dmpFilesize
28KB
-
memory/1212-26-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-16-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1212-7-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/1540-73-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1540-79-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2336-0-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2336-44-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2336-3-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2472-96-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB