Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b7a2e00a6f0a560d3230fb624e59871b
-
SHA1
7377a79136e1d9787cd431f389419865cb2bc086
-
SHA256
c2bcb7fc70fedc285ef4250a1244ece0a6455aca49bf76ee6bdd1e9add01ed28
-
SHA512
bd3cda925d1a12d1694408992eaa7c2591837a9ccdc318bda2cf4ce742abb420bc1a02928099d7a1115651d54d153d6e202bb9e7a00217b64e187d572c4fba1c
-
SSDEEP
24576:AVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8I:AV8hf6STw1ZlQauvzSq01ICe6zvmt
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-6-0x0000000002710000-0x0000000002711000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
javaws.exefveprompt.exerdpshell.exepid process 2652 javaws.exe 672 fveprompt.exe 1080 rdpshell.exe -
Loads dropped DLL 7 IoCs
Processes:
javaws.exefveprompt.exerdpshell.exepid process 1196 2652 javaws.exe 1196 672 fveprompt.exe 1196 1080 rdpshell.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gqwtkfbnxxlbs = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\LGivlhm5\\fveprompt.exe" -
Processes:
fveprompt.exerdpshell.exerundll32.exejavaws.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2196 1196 javaws.exe PID 1196 wrote to memory of 2196 1196 javaws.exe PID 1196 wrote to memory of 2196 1196 javaws.exe PID 1196 wrote to memory of 2652 1196 javaws.exe PID 1196 wrote to memory of 2652 1196 javaws.exe PID 1196 wrote to memory of 2652 1196 javaws.exe PID 1196 wrote to memory of 264 1196 fveprompt.exe PID 1196 wrote to memory of 264 1196 fveprompt.exe PID 1196 wrote to memory of 264 1196 fveprompt.exe PID 1196 wrote to memory of 672 1196 fveprompt.exe PID 1196 wrote to memory of 672 1196 fveprompt.exe PID 1196 wrote to memory of 672 1196 fveprompt.exe PID 1196 wrote to memory of 1724 1196 rdpshell.exe PID 1196 wrote to memory of 1724 1196 rdpshell.exe PID 1196 wrote to memory of 1724 1196 rdpshell.exe PID 1196 wrote to memory of 1080 1196 rdpshell.exe PID 1196 wrote to memory of 1080 1196 rdpshell.exe PID 1196 wrote to memory of 1080 1196 rdpshell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7a2e00a6f0a560d3230fb624e59871b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵
-
C:\Users\Admin\AppData\Local\d5D7\javaws.exeC:\Users\Admin\AppData\Local\d5D7\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵
-
C:\Users\Admin\AppData\Local\lVA\fveprompt.exeC:\Users\Admin\AppData\Local\lVA\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵
-
C:\Users\Admin\AppData\Local\GGt\rdpshell.exeC:\Users\Admin\AppData\Local\GGt\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GGt\WTSAPI32.dllFilesize
1.2MB
MD5dcb19328843592ca81b64dad8833e7d4
SHA1b4c40ba380449536fd54aa7c1ec779f7c16a9dd6
SHA2569f7faf98026df732f716c286bfbb35b4e109706a3a669674c5d2ebfafb55c3ae
SHA512c20f6df56ed9c205a122e47f00f111764da72d60e547c864391d3214279fdcfdbc80b7c60d0ff7c3da7c7271b71343b5e73fc1e0f260ad9c3d30c00fed6bb584
-
C:\Users\Admin\AppData\Local\d5D7\VERSION.dllFilesize
1.2MB
MD5cebb358d3207346e5eea8c7d8c2db521
SHA118f14a0d845ec709ce87fb7276419c623f965f74
SHA256207725167293c9872bd300cabafe0236e4a1d26269df4ebbad4104fee2f9bed7
SHA512b739b722031805be613a984999bdac7da2add488738c1733bc5e9caab508d8702f5ff5d365ad377665682232fca76cc227569cc12198dd5363b3a98c8de3e0cb
-
C:\Users\Admin\AppData\Local\lVA\fveprompt.exeFilesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
C:\Users\Admin\AppData\Local\lVA\slc.dllFilesize
1.2MB
MD59fa14b61e0700f6aa9e70003e217dbd1
SHA16d08ee7d8a37a089406def3246796786f5426056
SHA256dd9cad9395707ffcce9d89971141349056ddc177f79ebc59ab91f1a3ec7633f9
SHA5122d1c2326ac6410a5d9d287635d274c7312ec2ac3df83c6f752125ad08451ab120a89ba1eb0ca4c12ca3bf84554bdaeccf24b4bd806d4b7bc438759fb831d16ee
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Egmip.lnkFilesize
1KB
MD59358a26ddcdd1e5df4565db2eaeedb60
SHA1204e0efc3a981bd830a06f1580fddcc882962722
SHA25652992a6fcf0aa87c50631532182f304bd37a581b7691c277ba81fe021d490960
SHA51216f4c79b3c289c801df665f9b63144e858d6451ce4bcf2b5ed569b4c5ca43e2834e39e39bb8dae48d781399c4e62ceb0afaa1c9ea78ee720e1b1ede729c1d198
-
\Users\Admin\AppData\Local\GGt\rdpshell.exeFilesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603
-
\Users\Admin\AppData\Local\d5D7\javaws.exeFilesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52
-
memory/672-77-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/672-71-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1080-95-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1080-89-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/1196-63-0x0000000077A36000-0x0000000077A37000-memory.dmpFilesize
4KB
-
memory/1196-28-0x0000000077CD0000-0x0000000077CD2000-memory.dmpFilesize
8KB
-
memory/1196-10-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-9-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-24-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-4-0x0000000077A36000-0x0000000077A37000-memory.dmpFilesize
4KB
-
memory/1196-36-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-35-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-12-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-13-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-6-0x0000000002710000-0x0000000002711000-memory.dmpFilesize
4KB
-
memory/1196-7-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-8-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-14-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1196-15-0x00000000026F0000-0x00000000026F7000-memory.dmpFilesize
28KB
-
memory/1196-27-0x0000000077B41000-0x0000000077B42000-memory.dmpFilesize
4KB
-
memory/1196-11-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/2312-1-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/2312-42-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/2312-0-0x0000000000520000-0x0000000000527000-memory.dmpFilesize
28KB
-
memory/2652-58-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/2652-53-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/2652-52-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB