Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll
-
Size
987KB
-
MD5
aa742ad016ba5eda435c40d9f81a71b3
-
SHA1
65b0997bc86db191897e2a157be2534aa2edac28
-
SHA256
64f22c7a2ed309028e20b2fbe5fe093112ee81893877c6308846342020c855b7
-
SHA512
105cf6705de994afe6ad873f2a30641edf9e7795e9e4bb3cc5f35fff7a0d430b854d1689972fc60d1038972a408281b6d4e5dd429f87f0b5ab6ce07a9f1adcb2
-
SSDEEP
24576:YVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8W:YV8hf6STw1ZlQauvzSq01ICe6zvmN
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002B50000-0x0000000002B51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wisptis.exeMagnify.exeDxpserver.exepid process 2340 wisptis.exe 1480 Magnify.exe 2576 Dxpserver.exe -
Loads dropped DLL 7 IoCs
Processes:
wisptis.exeMagnify.exeDxpserver.exepid process 1192 2340 wisptis.exe 1192 1480 Magnify.exe 1192 2576 Dxpserver.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gqwtkfbnxxlbs = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\20e4lg8C\\Magnify.exe" -
Processes:
Dxpserver.exerundll32.exewisptis.exeMagnify.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2916 rundll32.exe 2916 rundll32.exe 2916 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 2688 1192 wisptis.exe PID 1192 wrote to memory of 2688 1192 wisptis.exe PID 1192 wrote to memory of 2688 1192 wisptis.exe PID 1192 wrote to memory of 2340 1192 wisptis.exe PID 1192 wrote to memory of 2340 1192 wisptis.exe PID 1192 wrote to memory of 2340 1192 wisptis.exe PID 1192 wrote to memory of 948 1192 Magnify.exe PID 1192 wrote to memory of 948 1192 Magnify.exe PID 1192 wrote to memory of 948 1192 Magnify.exe PID 1192 wrote to memory of 1480 1192 Magnify.exe PID 1192 wrote to memory of 1480 1192 Magnify.exe PID 1192 wrote to memory of 1480 1192 Magnify.exe PID 1192 wrote to memory of 2536 1192 Dxpserver.exe PID 1192 wrote to memory of 2536 1192 Dxpserver.exe PID 1192 wrote to memory of 2536 1192 Dxpserver.exe PID 1192 wrote to memory of 2576 1192 Dxpserver.exe PID 1192 wrote to memory of 2576 1192 Dxpserver.exe PID 1192 wrote to memory of 2576 1192 Dxpserver.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa742ad016ba5eda435c40d9f81a71b3_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵
-
C:\Users\Admin\AppData\Local\qKytlid\wisptis.exeC:\Users\Admin\AppData\Local\qKytlid\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵
-
C:\Users\Admin\AppData\Local\Fj7p\Magnify.exeC:\Users\Admin\AppData\Local\Fj7p\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵
-
C:\Users\Admin\AppData\Local\OPss2OB8\Dxpserver.exeC:\Users\Admin\AppData\Local\OPss2OB8\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\qKytlid\OLEACC.dllFilesize
988KB
MD5f48e6d94bc9b58ddc9188d020dc7dfb1
SHA1365bb50b88fa7cf91c5b2c773040abb11d926998
SHA25668dc3bdd94b83bd8f14cba9cc658f6e05dd52b34eea01611530f9ae6691ebc07
SHA512ac7185d34f3fdaed7695650f7824f5ec07307e8ce1375c4ea3caed06fb30a34e0ab254d4296efa2c87861ed02fe9129617ed3f87fc43bb254a6c8767ed346542
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Egmip.lnkFilesize
1KB
MD5b14c0c25d8d971dc93da15dc85924545
SHA164e28b386edc46e72cb2c92abdb2b0bb977aaf12
SHA25677f5ad7e75aa8aee5bee1aee9c822016ae6c0dcb387795d70868fca5e90d7a48
SHA51285e1c51641390c5448849c684c449d7bfef4c5ef0781dd1fa9159f3552e82c966b53f931ef07a52b6f4c8c3689995fda2a6899454cd81caa2d40fa1fe0dfae8a
-
\Users\Admin\AppData\Local\Fj7p\MAGNIFICATION.dllFilesize
988KB
MD517678264a50243d7eb38fd153be1e00c
SHA1cd5b417920fda88cdbac5bb54a812f9135d87145
SHA2561531c2ce7b5048b64df2acc83289f884dcc8775d318e7053cbdbe9e7f179ecb2
SHA512e975cf26c5996d9130e71d2acfcde5871335ae8ca81b1d5a6dd77e0ef21ce4501633542ae5150578793969308aa1859d8f03e8e6ae6ccfff3daba4f09c9b2a89
-
\Users\Admin\AppData\Local\Fj7p\Magnify.exeFilesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
\Users\Admin\AppData\Local\OPss2OB8\Dxpserver.exeFilesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
\Users\Admin\AppData\Local\OPss2OB8\XmlLite.dllFilesize
988KB
MD5a22577fa85e9708d1d4c01e1ebbf3d5d
SHA1231315aa5f7b4c2144c0f4e33c07f2ed87477eae
SHA256b959c689e92200909348f49aa8fbf13d926e6372847f5dbd9fe2a78c463b0096
SHA512a0d9b4bedf77d18c53a5f7d203f48a4660b4d6f22bf035647db1c7cec9bdb0570bf93305b2c1b4498ca1ee03628d10416ffb309c22b35908d70587f9b239ebae
-
\Users\Admin\AppData\Local\qKytlid\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
memory/1192-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-25-0x0000000077821000-0x0000000077822000-memory.dmpFilesize
4KB
-
memory/1192-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-28-0x00000000779B0000-0x00000000779B2000-memory.dmpFilesize
8KB
-
memory/1192-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-24-0x0000000002B30000-0x0000000002B37000-memory.dmpFilesize
28KB
-
memory/1192-32-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-33-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1192-5-0x0000000002B50000-0x0000000002B51000-memory.dmpFilesize
4KB
-
memory/1192-4-0x0000000077616000-0x0000000077617000-memory.dmpFilesize
4KB
-
memory/1192-52-0x0000000077616000-0x0000000077617000-memory.dmpFilesize
4KB
-
memory/1480-64-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/1480-70-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2340-54-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2340-53-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2340-49-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2576-87-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2916-0-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2916-29-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2916-1-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB