Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
87c3545cdce9ac4de4d6b4b059dc87ba_JaffaCakes118.dll
Resource
win7-20240419-en
General
-
Target
87c3545cdce9ac4de4d6b4b059dc87ba_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
87c3545cdce9ac4de4d6b4b059dc87ba
-
SHA1
59faa155317c706c9cd0898511a9b55266db63d3
-
SHA256
69410188e366c90d44d0f848b78601bd6174f0fb9825fb449368fc37aa6fb0ef
-
SHA512
7f9dff0546abea7fb00682599d467f7c37acc4e6cadb59a814d12023eb33e5586a485d2657c6c47a2777198a63083855d5f10a08bbf19b519c93c826d94299ef
-
SSDEEP
24576:xVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:xV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002D80000-0x0000000002D81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
notepad.exespinstall.exeDWWIN.EXEpid process 2416 notepad.exe 2964 spinstall.exe 2816 DWWIN.EXE -
Loads dropped DLL 7 IoCs
Processes:
notepad.exespinstall.exeDWWIN.EXEpid process 1192 2416 notepad.exe 1192 2964 spinstall.exe 1192 2816 DWWIN.EXE 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\LeoC1qgH\\spinstall.exe" -
Processes:
rundll32.exenotepad.exespinstall.exeDWWIN.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1960 rundll32.exe 1960 rundll32.exe 1960 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2824 1192 notepad.exe PID 1192 wrote to memory of 2824 1192 notepad.exe PID 1192 wrote to memory of 2824 1192 notepad.exe PID 1192 wrote to memory of 2416 1192 notepad.exe PID 1192 wrote to memory of 2416 1192 notepad.exe PID 1192 wrote to memory of 2416 1192 notepad.exe PID 1192 wrote to memory of 2124 1192 spinstall.exe PID 1192 wrote to memory of 2124 1192 spinstall.exe PID 1192 wrote to memory of 2124 1192 spinstall.exe PID 1192 wrote to memory of 2964 1192 spinstall.exe PID 1192 wrote to memory of 2964 1192 spinstall.exe PID 1192 wrote to memory of 2964 1192 spinstall.exe PID 1192 wrote to memory of 2828 1192 DWWIN.EXE PID 1192 wrote to memory of 2828 1192 DWWIN.EXE PID 1192 wrote to memory of 2828 1192 DWWIN.EXE PID 1192 wrote to memory of 2816 1192 DWWIN.EXE PID 1192 wrote to memory of 2816 1192 DWWIN.EXE PID 1192 wrote to memory of 2816 1192 DWWIN.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87c3545cdce9ac4de4d6b4b059dc87ba_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:2824
-
C:\Users\Admin\AppData\Local\ks3eMZO8G\notepad.exeC:\Users\Admin\AppData\Local\ks3eMZO8G\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2416
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:2124
-
C:\Users\Admin\AppData\Local\nkhda\spinstall.exeC:\Users\Admin\AppData\Local\nkhda\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2964
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:2828
-
C:\Users\Admin\AppData\Local\dQVX\DWWIN.EXEC:\Users\Admin\AppData\Local\dQVX\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD558e0710c5d877f87ce4811d280cd5290
SHA141173d4c83535ad441c514952c8ddad094dd8792
SHA2566a6a9c932ebb9e571b538346c9e15b8b1ed9430016c56d512300cc227122f7cd
SHA5121b2ce4cc81ede48787807799d303a40dd4014e9b27c970f857410b54c8ae38ff8c55a0ecb9e82a96a79d8abf16a459696587e7e6af56af3370c2ebc547ef8303
-
Filesize
1.2MB
MD521837545a0ca31263abde8f420e0497a
SHA1a11f8343f0aba188cf8b6c2a29cdc182c14591de
SHA2564247ba17f1163dd1fd045c50ef6302e4335985a70ddfad88e1fdac7d713a54c4
SHA5124f42868bd6fc84dade9d4fa776a3a7a7496b814bb9eff694cdd45c33a0aac885c71ea7e61dc6746c84311e3184d17a268272c9b01343203d735e1c2aebd9de07
-
Filesize
1.2MB
MD52441e2a622af15cfe10b184fe2ba11de
SHA175b2b31df185818e599461b4fa270ad75b7080db
SHA256208e9ec7dda58990678b1b607de58ee163d4fd9339a89ad4094c0923527ccf68
SHA5123b5e81b287d4f02ff1abe35011f0649b82ffa37fc3c735c00f80e07db4a1eb4fb70f51aaf1c7a3dfa63edaf303ce8a863d8ab1557d0808eec681ab42a4c15cfe
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
1KB
MD574dfb62f274aa8778babf5c86a0817ab
SHA16778656233652e0f2896bed0332849cb5264858c
SHA2565878ba28820eb21d60845a61932f8bf745bf2c053c203cac4f6378e456fa6b36
SHA5122f1f849111f163d9da30cf65b1d5b0030c58cec3f6290c5f24e0e4c059bc1cf3c6a5e14732c92fc6746db6238f3d0c064fc1498939a7c51db679777941e8f8be
-
Filesize
149KB
MD525247e3c4e7a7a73baeea6c0008952b1
SHA18087adb7a71a696139ddc5c5abc1a84f817ab688
SHA256c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050
SHA512bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8