Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll
-
Size
990KB
-
MD5
b701e2b9d6cd0a2dcc4bf110bdcd5e65
-
SHA1
93d31fc474daf3963b0664e3fadb47432469177d
-
SHA256
11a95688e0ad5924bea8664e03a8ed114d16fc06323819e26e8481cb19bbae95
-
SHA512
ac33c85628afaea0cf2f62829b0fe007004398176c4c42b9a19fdf9cef3441f106f292f83243871d91bae9127ce803cf0730ce70f110fbdb63dbc6ba712ecf50
-
SSDEEP
24576:vVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8Lt:vV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-5-0x00000000024D0000-0x00000000024D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mfpmp.exeBdeUISrv.exeTpmInit.exepid process 2636 mfpmp.exe 2180 BdeUISrv.exe 2552 TpmInit.exe -
Loads dropped DLL 7 IoCs
Processes:
mfpmp.exeBdeUISrv.exeTpmInit.exepid process 1184 2636 mfpmp.exe 1184 2180 BdeUISrv.exe 1184 2552 TpmInit.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqdbvnnwgmqj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\NETWOR~1\\PERJMX~1\\BdeUISrv.exe" -
Processes:
rundll32.exemfpmp.exeBdeUISrv.exeTpmInit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2548 rundll32.exe 2548 rundll32.exe 2548 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1184 wrote to memory of 2504 1184 mfpmp.exe PID 1184 wrote to memory of 2504 1184 mfpmp.exe PID 1184 wrote to memory of 2504 1184 mfpmp.exe PID 1184 wrote to memory of 2636 1184 mfpmp.exe PID 1184 wrote to memory of 2636 1184 mfpmp.exe PID 1184 wrote to memory of 2636 1184 mfpmp.exe PID 1184 wrote to memory of 1876 1184 BdeUISrv.exe PID 1184 wrote to memory of 1876 1184 BdeUISrv.exe PID 1184 wrote to memory of 1876 1184 BdeUISrv.exe PID 1184 wrote to memory of 2180 1184 BdeUISrv.exe PID 1184 wrote to memory of 2180 1184 BdeUISrv.exe PID 1184 wrote to memory of 2180 1184 BdeUISrv.exe PID 1184 wrote to memory of 2760 1184 TpmInit.exe PID 1184 wrote to memory of 2760 1184 TpmInit.exe PID 1184 wrote to memory of 2760 1184 TpmInit.exe PID 1184 wrote to memory of 2552 1184 TpmInit.exe PID 1184 wrote to memory of 2552 1184 TpmInit.exe PID 1184 wrote to memory of 2552 1184 TpmInit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b701e2b9d6cd0a2dcc4bf110bdcd5e65_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:2504
-
C:\Users\Admin\AppData\Local\kdtsac\mfpmp.exeC:\Users\Admin\AppData\Local\kdtsac\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2636
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:1876
-
C:\Users\Admin\AppData\Local\ur1YR\BdeUISrv.exeC:\Users\Admin\AppData\Local\ur1YR\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2180
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\EjEPj\TpmInit.exeC:\Users\Admin\AppData\Local\EjEPj\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
991KB
MD5adfc4b20cf88b0b7517320f306535860
SHA15983a05b39b4947dbfe60a794d01a398f2f201a0
SHA256ffcd781012bdd21119e5f5c13a31de45df3dcdf05b2447467665381375d8bc66
SHA512a1e11f423062fad81659ee317b64233b865add5bcccea831e416637b8729dbf9187dc2d5bb96a8d1af41d3737c55916d88a5c23b223cfc31f92a4750ef4c06d2
-
Filesize
995KB
MD5d63f8b4812634062428120f7f005a1c4
SHA1ab42f3a24f36845ff67efb1420465f24550e732f
SHA2569291df359fdf9651629c828dfb77c5bcdc0c46e44525ca467c88128eb11495ce
SHA512d13dcac8e57e29f91ea49be48509d038ca1f87135df8d15183e17713e350bcd37a42b4c1d23f6ea2d5dce501d727a74719ac164488aa29879183f8b3eb986e7a
-
Filesize
992KB
MD5b5f1f9c0d138fec5a4888365c23e165c
SHA11d9bb3c5cb4223097c27f6d5a0ad37e26e34c188
SHA25637c308c52fb0ccd72ca46049ec974b863136dcd9f71045d2095d950001db1936
SHA512ee2936dcc917d869cdd1a83d1a3c05bfad98036aa9e90878c3853990028801eea2f0e8560df758d52c6c787828f2268a4d6513efd934eca9fa15050017d318dd
-
Filesize
1KB
MD5457bf8432557f666af18fbadc02e707f
SHA1bcfb8f5cd837fc0c1503f7ac2e048c864145f546
SHA256eec5d0fa451741d380c38f4a65674bb979e8bf976c42cbdd79b3b76cf0121441
SHA512a8039ecfdd47260f56cac1901a07df800ecc3513e363950435afb4dd225ed00903afceaf9dad5b188060bd574633d44035f866128c4d93c8a8765848951bff29
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6