Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
890585cd2e7a7240f8717a699df466c6_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
890585cd2e7a7240f8717a699df466c6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
890585cd2e7a7240f8717a699df466c6
-
SHA1
905cc34008102e2497e9dbb3e11a1cd0a5b591ba
-
SHA256
23af8a04d56b123342384a11c863a934154029823ee3e5e744a9fbedbb4dac12
-
SHA512
3135756a9194a05256d9caf0ecf06ea3abe15c080e7c2b09b4419d8a95c4856a500cb5ab2e0afb0a1f2ade9c51877c56064b29148542dbc7da51e203dc1562d2
-
SSDEEP
24576:5uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:r9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002990000-0x0000000002991000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WFS.exewinlogon.exeosk.exepid process 2368 WFS.exe 1960 winlogon.exe 1768 osk.exe -
Loads dropped DLL 7 IoCs
Processes:
WFS.exewinlogon.exeosk.exepid process 1204 2368 WFS.exe 1204 1960 winlogon.exe 1204 1768 osk.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\8DzdBvb2TEk\\winlogon.exe" -
Processes:
osk.exerundll32.exeWFS.exewinlogon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 1564 1204 WFS.exe PID 1204 wrote to memory of 1564 1204 WFS.exe PID 1204 wrote to memory of 1564 1204 WFS.exe PID 1204 wrote to memory of 2368 1204 WFS.exe PID 1204 wrote to memory of 2368 1204 WFS.exe PID 1204 wrote to memory of 2368 1204 WFS.exe PID 1204 wrote to memory of 1808 1204 winlogon.exe PID 1204 wrote to memory of 1808 1204 winlogon.exe PID 1204 wrote to memory of 1808 1204 winlogon.exe PID 1204 wrote to memory of 1960 1204 winlogon.exe PID 1204 wrote to memory of 1960 1204 winlogon.exe PID 1204 wrote to memory of 1960 1204 winlogon.exe PID 1204 wrote to memory of 2284 1204 osk.exe PID 1204 wrote to memory of 2284 1204 osk.exe PID 1204 wrote to memory of 2284 1204 osk.exe PID 1204 wrote to memory of 1768 1204 osk.exe PID 1204 wrote to memory of 1768 1204 osk.exe PID 1204 wrote to memory of 1768 1204 osk.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\890585cd2e7a7240f8717a699df466c6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\NMfx2\WFS.exeC:\Users\Admin\AppData\Local\NMfx2\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵
-
C:\Users\Admin\AppData\Local\l6Tzd\winlogon.exeC:\Users\Admin\AppData\Local\l6Tzd\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\7pups\osk.exeC:\Users\Admin\AppData\Local\7pups\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7pups\osk.exeFilesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
C:\Users\Admin\AppData\Local\NMfx2\MFC42u.dllFilesize
1.2MB
MD5fa90450f5e6137787248c021446ea10a
SHA1f21b8760781683be5fcb6306bbb9c687f7e69590
SHA256617407796aafff4db97160ceced104aec644e2497337e63d0ac5d15ed36702f4
SHA512c9064677d9052d20952d10ef697de48608a7a8bf6bb94249cfb9c2f2282012697e927d79907c9b078f2ed7ce268cf817cb77ba7f8a50deb77aff8b660a711554
-
C:\Users\Admin\AppData\Local\NMfx2\WFS.exeFilesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
C:\Users\Admin\AppData\Local\l6Tzd\WINSTA.dllFilesize
1.2MB
MD504252d269d2c555f9cc572db89791d08
SHA1e0a6bc9a187fbb7f38b4eccc43a9c209960484bf
SHA256c0b8a76c41dac14ec05ac385a05633c088f7afbe85bfff8f5e0d549cd0315808
SHA51286f88708fc8854887a4954ce7101ad46c650380cf77ef25cb8dd9043f7fc47848db0753e4e952572a8b34cef24f2ee67c1e8d018c248640d00a7456c27689e96
-
C:\Users\Admin\AppData\Local\l6Tzd\winlogon.exeFilesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD547e7dad1a424803ace6eb86437eca6a2
SHA1cc7c9e7ea73a3439ce3c81d1cd0f5dbfebe62c58
SHA256d997cbfa18426cc756c78e94f4b42599609f2f18d067e4864c4650364b035774
SHA512221d3edf76034cb678850c2ef7c704f011e4ea6d8390025a0c30e6e19dd09b3cc8df6e4f279ae1643940ed7059ba4528ac017e1318b6d3c87c3b0e285d131f9b
-
\Users\Admin\AppData\Local\7pups\WMsgAPI.dllFilesize
1.2MB
MD534b502b4ae3c6ecde86475663d544a5c
SHA1667ad14446337367fd2744933bc9ae3ece358368
SHA256f619f78136d417f7e5818aec0cb35fe2041dc045853e385072285963f46463e0
SHA5129d3202dcbf04c26a02a4350ddaaa4dac2aa256d29f4e27fc61b21e6797f46d27dfbb729152659edb3df8b89b77fcf8d341d43104889519308220117373891179
-
memory/1204-17-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-26-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-18-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-4-0x0000000077866000-0x0000000077867000-memory.dmpFilesize
4KB
-
memory/1204-16-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-14-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-13-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-12-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-11-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-10-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-9-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-8-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-15-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-5-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/1204-36-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-35-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-31-0x0000000077B00000-0x0000000077B02000-memory.dmpFilesize
8KB
-
memory/1204-30-0x0000000077971000-0x0000000077972000-memory.dmpFilesize
4KB
-
memory/1204-7-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1204-27-0x0000000002210000-0x0000000002217000-memory.dmpFilesize
28KB
-
memory/1204-61-0x0000000077866000-0x0000000077867000-memory.dmpFilesize
4KB
-
memory/1768-87-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/1768-89-0x000007FEF68C0000-0x000007FEF6A01000-memory.dmpFilesize
1.3MB
-
memory/1768-93-0x000007FEF68C0000-0x000007FEF6A01000-memory.dmpFilesize
1.3MB
-
memory/1960-69-0x000007FEF68C0000-0x000007FEF6A02000-memory.dmpFilesize
1.3MB
-
memory/1960-72-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1960-75-0x000007FEF68C0000-0x000007FEF6A02000-memory.dmpFilesize
1.3MB
-
memory/2368-56-0x000007FEF7820000-0x000007FEF7967000-memory.dmpFilesize
1.3MB
-
memory/2368-54-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/2368-51-0x000007FEF7820000-0x000007FEF7967000-memory.dmpFilesize
1.3MB
-
memory/2612-32-0x000007FEF68D0000-0x000007FEF6A10000-memory.dmpFilesize
1.2MB
-
memory/2612-0-0x000007FEF68D0000-0x000007FEF6A10000-memory.dmpFilesize
1.2MB
-
memory/2612-3-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB