Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a03c427291b7a95b1aab3b2d9839a4ac
-
SHA1
f65ffc2a7a1d263bfa112d9bade412e2907a06fb
-
SHA256
439fb687b9a2d78aa8385a756084b8c76c40972a59030daa92153cc60b8fa7d1
-
SHA512
504fcbed01f3c79a4a32bf3646f5ac7d4933e2b0f374a8782b7d227cee484c929c6021c7359e707158d669bbe6fa1a8f887a063b03cb50b45d1e4562adbee208
-
SSDEEP
24576:WVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:WV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002CF0000-0x0000000002CF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
fvenotify.exeFXSCOVER.execmstp.exepid process 2664 fvenotify.exe 3052 FXSCOVER.exe 636 cmstp.exe -
Loads dropped DLL 7 IoCs
Processes:
fvenotify.exeFXSCOVER.execmstp.exepid process 1200 2664 fvenotify.exe 1200 3052 FXSCOVER.exe 1200 636 cmstp.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ytaumll = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\UwQ\\FXSCOVER.exe" -
Processes:
rundll32.exefvenotify.exeFXSCOVER.execmstp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fvenotify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2432 rundll32.exe 2432 rundll32.exe 2432 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1200 wrote to memory of 2548 1200 fvenotify.exe PID 1200 wrote to memory of 2548 1200 fvenotify.exe PID 1200 wrote to memory of 2548 1200 fvenotify.exe PID 1200 wrote to memory of 2664 1200 fvenotify.exe PID 1200 wrote to memory of 2664 1200 fvenotify.exe PID 1200 wrote to memory of 2664 1200 fvenotify.exe PID 1200 wrote to memory of 2276 1200 FXSCOVER.exe PID 1200 wrote to memory of 2276 1200 FXSCOVER.exe PID 1200 wrote to memory of 2276 1200 FXSCOVER.exe PID 1200 wrote to memory of 3052 1200 FXSCOVER.exe PID 1200 wrote to memory of 3052 1200 FXSCOVER.exe PID 1200 wrote to memory of 3052 1200 FXSCOVER.exe PID 1200 wrote to memory of 1300 1200 cmstp.exe PID 1200 wrote to memory of 1300 1200 cmstp.exe PID 1200 wrote to memory of 1300 1200 cmstp.exe PID 1200 wrote to memory of 636 1200 cmstp.exe PID 1200 wrote to memory of 636 1200 cmstp.exe PID 1200 wrote to memory of 636 1200 cmstp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a03c427291b7a95b1aab3b2d9839a4ac_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\fvenotify.exeC:\Windows\system32\fvenotify.exe1⤵
-
C:\Users\Admin\AppData\Local\NMoIH\fvenotify.exeC:\Users\Admin\AppData\Local\NMoIH\fvenotify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\WaRd6Hi\FXSCOVER.exeC:\Users\Admin\AppData\Local\WaRd6Hi\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵
-
C:\Users\Admin\AppData\Local\1tiQMKd\cmstp.exeC:\Users\Admin\AppData\Local\1tiQMKd\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1tiQMKd\VERSION.dllFilesize
1.2MB
MD52c4e1b3dbdb9253712defcb0ffd76b37
SHA1be8ebbfccefa4fa05e243854a8dcb2817ef194f7
SHA25635ed86777989940c2251d21b1bffdffdb060ae206ca45e07838b70f9a2d98511
SHA51222ad969a65b4b8d1fff46250082bfcd7ca8c16ec09ef06e8638d51f23cafb5e6e2474a52cf182113632d24ff6739c0427a6f99e38f1ca394a9603d05b97e23db
-
C:\Users\Admin\AppData\Local\NMoIH\slc.dllFilesize
1.2MB
MD505350b65a50e512b803fa21b0d3ced2d
SHA181216b93f7fef670656bb88e2f665e59d714d330
SHA25611a418f75cf13630cd140912aacc69046914ec89c923a20d1e5dab6aa8e0b020
SHA5128273bae7493af57f8ad0641a1ef75b13b46e7b313c0c4962b1d0d8f2e376e6b0728a8b5643c5760a94d56fd021684279c82bd038f6b117297778d45c7f8d4a30
-
C:\Users\Admin\AppData\Local\WaRd6Hi\MFC42u.dllFilesize
1.3MB
MD5c3eda57652c9ae49f7d95a2a2acf8fac
SHA11de46b303b572db531de2c6177e8ca6274ce40a2
SHA2560c83349ea1a49c474faef531b3e5c0efe6f4604fe008c3c520accba857475ffa
SHA5129021d9334a109f68219c1ce42c7a0204513eea265e8e50bbf9e32d38ba83388c1cb33d81b3ed6a1dbd2002a9b8d92b93b7d3d5228f009ee0ed376d080409ae5d
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Auushichw.lnkFilesize
1KB
MD5c03309d321bba318188c7287b332f918
SHA111516533b12c0909cee3bab23e4f230944c38b0c
SHA25651d68b1b17d8813b2fdbfc62dd2aea69a97e92b11e02833e0768108c39141673
SHA512747183f746ee8eeb097e726c90d02b7099bc3bc564adc4335710dce78db0d2c1a22894c08dcb1ef87626caeeae99f7f80fa5353297a12276ca1f43a7d92933b3
-
\Users\Admin\AppData\Local\1tiQMKd\cmstp.exeFilesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
\Users\Admin\AppData\Local\NMoIH\fvenotify.exeFilesize
117KB
MD5e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272
-
\Users\Admin\AppData\Local\WaRd6Hi\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
memory/636-96-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/636-90-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/1200-24-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-64-0x00000000774E6000-0x00000000774E7000-memory.dmpFilesize
4KB
-
memory/1200-14-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-13-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-12-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-37-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-36-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-33-0x0000000077880000-0x0000000077882000-memory.dmpFilesize
8KB
-
memory/1200-28-0x00000000776F1000-0x00000000776F2000-memory.dmpFilesize
4KB
-
memory/1200-25-0x0000000002CD0000-0x0000000002CD7000-memory.dmpFilesize
28KB
-
memory/1200-8-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-5-0x0000000002CF0000-0x0000000002CF1000-memory.dmpFilesize
4KB
-
memory/1200-11-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-15-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-9-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-4-0x00000000774E6000-0x00000000774E7000-memory.dmpFilesize
4KB
-
memory/1200-7-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1200-10-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2432-3-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2432-0-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2432-45-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/2664-53-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2664-59-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2664-56-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/3052-78-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/3052-73-0x0000000140000000-0x0000000140149000-memory.dmpFilesize
1.3MB
-
memory/3052-72-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB