Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll
-
Size
990KB
-
MD5
ad83edd17de18486efe22dc738daeae5
-
SHA1
d02937cc07297a06bd372334a4b01cf19f34740a
-
SHA256
58a7b50c5201c447d6259a1dcd04e0f0d54ad73cf5a4a9cbe7bc2d7eb1ca8887
-
SHA512
9aa535f0ada29522f228732ea1808d60e3a819d4172ba6f704e3d893f655deb2cfd245d9738259dba6ec86fe56fbbbedcc59ed4e7db09d4a1c01b4f9a5a64b9d
-
SSDEEP
24576:SVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:SV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002650000-0x0000000002651000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
ComputerDefaults.exeraserver.exemfpmp.exepid process 3036 ComputerDefaults.exe 2568 raserver.exe 1948 mfpmp.exe -
Loads dropped DLL 7 IoCs
Processes:
ComputerDefaults.exeraserver.exemfpmp.exepid process 1204 3036 ComputerDefaults.exe 1204 2568 raserver.exe 1204 1948 mfpmp.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nnwuocalikj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\1DfpD9H\\raserver.exe" -
Processes:
rundll32.exeComputerDefaults.exeraserver.exemfpmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ComputerDefaults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2656 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2656 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2656 1204 ComputerDefaults.exe PID 1204 wrote to memory of 3036 1204 ComputerDefaults.exe PID 1204 wrote to memory of 3036 1204 ComputerDefaults.exe PID 1204 wrote to memory of 3036 1204 ComputerDefaults.exe PID 1204 wrote to memory of 2536 1204 raserver.exe PID 1204 wrote to memory of 2536 1204 raserver.exe PID 1204 wrote to memory of 2536 1204 raserver.exe PID 1204 wrote to memory of 2568 1204 raserver.exe PID 1204 wrote to memory of 2568 1204 raserver.exe PID 1204 wrote to memory of 2568 1204 raserver.exe PID 1204 wrote to memory of 1632 1204 mfpmp.exe PID 1204 wrote to memory of 1632 1204 mfpmp.exe PID 1204 wrote to memory of 1632 1204 mfpmp.exe PID 1204 wrote to memory of 1948 1204 mfpmp.exe PID 1204 wrote to memory of 1948 1204 mfpmp.exe PID 1204 wrote to memory of 1948 1204 mfpmp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad83edd17de18486efe22dc738daeae5_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\ComputerDefaults.exeC:\Windows\system32\ComputerDefaults.exe1⤵
-
C:\Users\Admin\AppData\Local\i78aHS\ComputerDefaults.exeC:\Users\Admin\AppData\Local\i78aHS\ComputerDefaults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\MoTvt8\raserver.exeC:\Users\Admin\AppData\Local\MoTvt8\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Z52q\mfpmp.exeC:\Users\Admin\AppData\Local\Z52q\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\MoTvt8\WTSAPI32.dllFilesize
992KB
MD51c2921857730eed768a128cc1251d9d1
SHA12c347a1844e2987ba9ecf139e61730fad1f76e80
SHA256955ce67cabcbd3e73deb2a123b2d359492171615eb366063e3167d7dd35c7a0a
SHA5122cc208f39c40cd06bd2ebcd3858741ea7fbb49e9c17b9fdbfac62627beeae253cb6233672c0e039feb0bf965aa913ef788cea48ca315c4a45d21a5263d094541
-
C:\Users\Admin\AppData\Local\Z52q\MFPlat.DLLFilesize
996KB
MD5f20a5f4ba90a83e0a934489288ba5679
SHA16b5b9cbd17792fc668499177c6c4cd658fed45d3
SHA25695bc8ffaa2735770fc17aa9f883d73e9e2fbd72c101464953cb7438916de1967
SHA512ede2a56d58db9b0bce48dbb66ccd013f0b997843302346c2cf940ac2fdc2b3fb32426f62adb62cb611d8000ff8e9c9f230d75b5767229f5b8e161bf786fa4866
-
C:\Users\Admin\AppData\Local\i78aHS\appwiz.cplFilesize
991KB
MD5b3a1f8a420284057eab562a15b320863
SHA1255971fb647e8e666dbe4ccef1a7602e64687aff
SHA256a61847ce94206397068e3645da58cace9a36e765d6754acdf1eb6bf32b7aad9a
SHA51277b6d108a3afc99933d2f17021abdb5618effef6b1370614e3f057127a062e31fe23c7dccc08bfb9eb4a258c94f4f037d3c721dec1d2286151c09a664d2cc5b1
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eyoyeoki.lnkFilesize
1KB
MD5bb5b39ae7f07722a046b6ed553c3a5a2
SHA15f96784cfcc12933a0fda920e47f28525d557223
SHA256ae602e5ceb266dc6289c8857c49cbc6118a3b4e7287729eac692297d3945af29
SHA5125411ef00c6219526090b95007fb27e22d452cb700e8a8c4753f261dff50dcdc023e858f93e26398b88149840e422bc8a11067c030eb17aea0988b1e906c889c7
-
\Users\Admin\AppData\Local\MoTvt8\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\Z52q\mfpmp.exeFilesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
\Users\Admin\AppData\Local\i78aHS\ComputerDefaults.exeFilesize
36KB
MD586bd981f55341273753ac42ea200a81e
SHA114fe410efc9aeb0a905b984ac27719ff0dd10ea7
SHA25640b194be2bad2d3d4d1b69f9aec2853c8b663130810a11607ff72a9e3a06d5b3
SHA51249bb6d4bf7a9356fadde7f6165af6973630827d28b69db10ad477a84d98b08fb82e4daae777166e1ddddb5b5efcdf634e4e9bd34b255dae87462ba32e8bba143
-
memory/1204-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-37-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-5-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/1204-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-26-0x0000000077251000-0x0000000077252000-memory.dmpFilesize
4KB
-
memory/1204-27-0x00000000773E0000-0x00000000773E2000-memory.dmpFilesize
8KB
-
memory/1204-36-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-4-0x0000000077146000-0x0000000077147000-memory.dmpFilesize
4KB
-
memory/1204-24-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-25-0x0000000002630000-0x0000000002637000-memory.dmpFilesize
28KB
-
memory/1204-15-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1204-64-0x0000000077146000-0x0000000077147000-memory.dmpFilesize
4KB
-
memory/1948-91-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/1948-96-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/1948-90-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2072-1-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2072-45-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2072-0-0x0000000000530000-0x0000000000537000-memory.dmpFilesize
28KB
-
memory/2568-78-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2568-75-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/3036-59-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3036-54-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/3036-53-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB