Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll
-
Size
994KB
-
MD5
90d39f9ec98db742751322a9a5548598
-
SHA1
b952239166fce6b42c30fd9225d67e404593f9a7
-
SHA256
059d1b17a6ca578711f0f2cd12a71b4d9349fbbb0e4ab273c29ef464aa776354
-
SHA512
edb620dbe08ab02d95d60b7fc9cc925c7e6e04f98d159120a2178ad07d65646571e5ebabac60f06cac963ade15ae5126958963c3f9852f211e0fb94891f847c9
-
SSDEEP
24576:zVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:zV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-5-0x0000000003050000-0x0000000003051000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
UI0Detect.exeSoundRecorder.exeNetplwiz.exepid process 2620 UI0Detect.exe 1960 SoundRecorder.exe 1132 Netplwiz.exe -
Loads dropped DLL 7 IoCs
Processes:
UI0Detect.exeSoundRecorder.exeNetplwiz.exepid process 1208 2620 UI0Detect.exe 1208 1960 SoundRecorder.exe 1208 1132 Netplwiz.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\SYSTEM~1\\1Xi95\\SOUNDR~1.EXE" -
Processes:
rundll32.exeUI0Detect.exeSoundRecorder.exeNetplwiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1276 rundll32.exe 1276 rundll32.exe 1276 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1208 wrote to memory of 2588 1208 UI0Detect.exe PID 1208 wrote to memory of 2588 1208 UI0Detect.exe PID 1208 wrote to memory of 2588 1208 UI0Detect.exe PID 1208 wrote to memory of 2620 1208 UI0Detect.exe PID 1208 wrote to memory of 2620 1208 UI0Detect.exe PID 1208 wrote to memory of 2620 1208 UI0Detect.exe PID 1208 wrote to memory of 1992 1208 SoundRecorder.exe PID 1208 wrote to memory of 1992 1208 SoundRecorder.exe PID 1208 wrote to memory of 1992 1208 SoundRecorder.exe PID 1208 wrote to memory of 1960 1208 SoundRecorder.exe PID 1208 wrote to memory of 1960 1208 SoundRecorder.exe PID 1208 wrote to memory of 1960 1208 SoundRecorder.exe PID 1208 wrote to memory of 2548 1208 Netplwiz.exe PID 1208 wrote to memory of 2548 1208 Netplwiz.exe PID 1208 wrote to memory of 2548 1208 Netplwiz.exe PID 1208 wrote to memory of 1132 1208 Netplwiz.exe PID 1208 wrote to memory of 1132 1208 Netplwiz.exe PID 1208 wrote to memory of 1132 1208 Netplwiz.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90d39f9ec98db742751322a9a5548598_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:2588
-
C:\Users\Admin\AppData\Local\etBip\UI0Detect.exeC:\Users\Admin\AppData\Local\etBip\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2620
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵PID:1992
-
C:\Users\Admin\AppData\Local\8Jlg\SoundRecorder.exeC:\Users\Admin\AppData\Local\8Jlg\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1960
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2548
-
C:\Users\Admin\AppData\Local\wug4c\Netplwiz.exeC:\Users\Admin\AppData\Local\wug4c\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD50852abd25873b18488b3825fe344b473
SHA1e5469004962690d288fdf1329515cb473f97dd50
SHA256b4a543e76bb07b52ae15676fb5261aab5f858dc6ce787a999210a2125a53bbff
SHA51298caa42ac9cab84ec022afff1caaa609530b935b17125e503deb01cef0df7a4a3f27050c7182c0b808b74f0348849790184252ad75ee1d693d556c8af50ed9b8
-
Filesize
999KB
MD583200010b6b9c42d9b781698961490ef
SHA1aea5114a7b67682b013b66bb24fe28caac7e6a3a
SHA2564daf6a5af2fd854484adf054453da511909638f409838b35375a298cbd472d42
SHA5123c79cababe069b8a119ebdd5a0628df03c428d6bd9f30f61ea15ccb149c2f440646b6064aaeb15499329e5a9b22b3e52833560b1f4fcebfe1e511167462e224c
-
Filesize
994KB
MD5fea3195f2897d690c7ba3b7775ba72f4
SHA12d499ceb9941e7011e80ccf9ed019757c72472ce
SHA2565f6bec04232b137499b7c1e9c1cf6534f538ecb54a2c6132d99a27ea8ca7df84
SHA512a8dd99d6b71a2eb60114ea8ef00cd52d0d7816507d228b7c5609e326fd421a3079e9d8bf93a399d16d5a44d55478144a56a08d1d99bd3b542fe5535091b7457e
-
Filesize
1KB
MD586b92f3722dccbe632ea62ac34ced4e7
SHA168e5a345c12d320a1df7d563d8bc787da41a9046
SHA256a191a5a7fd78b6cbaf85639113b036ab34453142c472d27b66a068618125236a
SHA512581a6be59c54bf9b116a3f81e8c79865a6e8412fd6a7866634b4b204db379a8caf0b4219a4b11c6a8fefbfa85c474d4ef31f4dcb8ebc50f4ddce08504f16399b
-
Filesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08