Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
6c520ed93654e6369dcf1ef50efee865_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
6c520ed93654e6369dcf1ef50efee865_JaffaCakes118.dll
-
Size
836KB
-
MD5
6c520ed93654e6369dcf1ef50efee865
-
SHA1
1e8ae55c1e4fd4c0cdcdc7f07dcb3bdc58e2d1c0
-
SHA256
ded7d0db8eaae0010cffb8fd3713ecbc1af523fe04414a324f367abda4e3d02a
-
SHA512
84e1fb30bf653a8d3b7258b1b632fd7283f462107fae614690b499f5e609c812e770615441870970bd3d15ccaffe12be52c417895204cddad835ab8049997a0b
-
SSDEEP
12288:1dMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:bMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1240-4-0x00000000024D0000-0x00000000024D1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2116-0-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/1240-47-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/1240-59-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/1240-58-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/2116-67-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/2464-76-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/2464-79-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/2848-97-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2464 icardagt.exe 2848 cmstp.exe 1688 VaultSysUi.exe -
Loads dropped DLL 8 IoCs
pid Process 1240 Process not Found 2464 icardagt.exe 1240 Process not Found 2848 cmstp.exe 1240 Process not Found 1240 Process not Found 1688 VaultSysUi.exe 1240 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tlngny = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\plD\\cmstp.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VaultSysUi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2728 1240 Process not Found 31 PID 1240 wrote to memory of 2728 1240 Process not Found 31 PID 1240 wrote to memory of 2728 1240 Process not Found 31 PID 1240 wrote to memory of 2464 1240 Process not Found 32 PID 1240 wrote to memory of 2464 1240 Process not Found 32 PID 1240 wrote to memory of 2464 1240 Process not Found 32 PID 1240 wrote to memory of 2920 1240 Process not Found 33 PID 1240 wrote to memory of 2920 1240 Process not Found 33 PID 1240 wrote to memory of 2920 1240 Process not Found 33 PID 1240 wrote to memory of 2848 1240 Process not Found 34 PID 1240 wrote to memory of 2848 1240 Process not Found 34 PID 1240 wrote to memory of 2848 1240 Process not Found 34 PID 1240 wrote to memory of 2908 1240 Process not Found 35 PID 1240 wrote to memory of 2908 1240 Process not Found 35 PID 1240 wrote to memory of 2908 1240 Process not Found 35 PID 1240 wrote to memory of 1688 1240 Process not Found 36 PID 1240 wrote to memory of 1688 1240 Process not Found 36 PID 1240 wrote to memory of 1688 1240 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6c520ed93654e6369dcf1ef50efee865_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:2728
-
C:\Users\Admin\AppData\Local\BecJfd09R\icardagt.exeC:\Users\Admin\AppData\Local\BecJfd09R\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2464
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:2920
-
C:\Users\Admin\AppData\Local\4Pr0EJso\cmstp.exeC:\Users\Admin\AppData\Local\4Pr0EJso\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2848
-
C:\Windows\system32\VaultSysUi.exeC:\Windows\system32\VaultSysUi.exe1⤵PID:2908
-
C:\Users\Admin\AppData\Local\swIOK\VaultSysUi.exeC:\Users\Admin\AppData\Local\swIOK\VaultSysUi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD533988d01f49afc80f815271da961588c
SHA1035f2c1e9c5cb337fcdf1ef453b06a62a45a1ac6
SHA2564932ab9921187fa474e8831b94290c08fed655fffb71a1e065c0a072e74314b2
SHA512fb8f654b89edc956e6d98447fd03cfce8817825f20ff3c77691414237174f86069920c14838c1703842d0a2850cb0b54a663d69ac3a68b5a28eecfa0bc14dc92
-
Filesize
840KB
MD520d3a7bae9cecbe480be36f98922e0ae
SHA1dffff4abed3a0b7860b60e5077042d15c7b07c88
SHA256814f75fa881ff4ded950c2f466ce6869d774433aef60b4145733b0a57ffc8ae6
SHA5123ee64ef7440b0bb0d430e8b8daad6a573466c5ba702df2ae9326e4c8950a7a3ab2aa9f2ef1b9ff8e7ced681a9a8cd1c8564f5c4f50e8ec90514a6d69433e358d
-
Filesize
39KB
MD5f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1
-
Filesize
840KB
MD5d763d3fe5115c51720ae5511cf10ed6c
SHA19ef22dcbcaa996718705318308066dd091e60fe0
SHA2567124392e71f7639fbc933e719a63299420cba2d0cd6966e84f0f9d7b8f9c46c4
SHA51264f4a8adb0df9d7321bc71beeac5f8e50eeed84d12ad72aa09f2631798298c5f4f5e0d82c075a4c5e11eaacfa08a638fb6fa74661c94a3aa6d38d7df86191e5c
-
Filesize
945B
MD53d7c1a1a2147372c1065e20db37ccb2b
SHA12305a3ea63f0acf7ff04ce69a58438c70a60c63c
SHA256803ac945d83ae4ba03f24bd46ce7571c778f5edea15976854fe85fe3d2bd6ec8
SHA512b19014fdfedf8039068a8ae61443145050031f7b38ba0a72cb18344baa78610184b44470a0a38f61df10846f37597c0d1f3a5ba947fe647eba3dcfe3a46945f5
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a