Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
2b619456f28686f6e8a7626fe7b24a57_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
2b619456f28686f6e8a7626fe7b24a57_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2b619456f28686f6e8a7626fe7b24a57
-
SHA1
64bf0dee2bbe9994547303b29d6725536ccf6b04
-
SHA256
501fed924342c7023015068c2dc4317c7f23a301ac6d62442880dfa0afda68d6
-
SHA512
92a1882ff972e34da28be4e115ab349ae9cf85519266a26def634d0eade600d2fb900dabd494956ab620aa0ec056fc58b07f0bfa509e373888655a1d801a14aa
-
SSDEEP
24576:WuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:W9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002ED0000-0x0000000002ED1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2152 msconfig.exe 2104 ddodiag.exe 2936 RDVGHelper.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2152 msconfig.exe 1200 Process not Found 2104 ddodiag.exe 1200 Process not Found 2936 RDVGHelper.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Neewpjodwhuy = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\3wcUzOkHwyI\\ddodiag.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 696 rundll32.exe 696 rundll32.exe 696 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2688 1200 Process not Found 31 PID 1200 wrote to memory of 2688 1200 Process not Found 31 PID 1200 wrote to memory of 2688 1200 Process not Found 31 PID 1200 wrote to memory of 2152 1200 Process not Found 32 PID 1200 wrote to memory of 2152 1200 Process not Found 32 PID 1200 wrote to memory of 2152 1200 Process not Found 32 PID 1200 wrote to memory of 2692 1200 Process not Found 33 PID 1200 wrote to memory of 2692 1200 Process not Found 33 PID 1200 wrote to memory of 2692 1200 Process not Found 33 PID 1200 wrote to memory of 2104 1200 Process not Found 34 PID 1200 wrote to memory of 2104 1200 Process not Found 34 PID 1200 wrote to memory of 2104 1200 Process not Found 34 PID 1200 wrote to memory of 2820 1200 Process not Found 35 PID 1200 wrote to memory of 2820 1200 Process not Found 35 PID 1200 wrote to memory of 2820 1200 Process not Found 35 PID 1200 wrote to memory of 2936 1200 Process not Found 36 PID 1200 wrote to memory of 2936 1200 Process not Found 36 PID 1200 wrote to memory of 2936 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b619456f28686f6e8a7626fe7b24a57_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:696
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Q8IwYWlb\msconfig.exeC:\Users\Admin\AppData\Local\Q8IwYWlb\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2152
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:2692
-
C:\Users\Admin\AppData\Local\rsuVZO\ddodiag.exeC:\Users\Admin\AppData\Local\rsuVZO\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2104
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\kWFW\RDVGHelper.exeC:\Users\Admin\AppData\Local\kWFW\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5252edba070754930bab03f3d52be8e99
SHA11bab0af5bd791564f4745edc08375a64471b8c7a
SHA256d77a9340a7f9c4ef5f7c38653f19a497f54e4eb47d78638062adbff8e7ece29c
SHA512fcbdb639adc73ce4baf306ac2c2377a38337782237e5c289603c6dc19cb698799035efe44e28b3084b86407b9a6aac6049aab995c88f4d0537697fdb9aa008b0
-
Filesize
1.2MB
MD582071f6e0361fe3c8fec4429bf817441
SHA15533b003fa402c82b8f6f950c372de3a6a54526a
SHA2566975542af935b1ca94e86094642264dc1c5bb631eb2369ebf88e57557a8332eb
SHA512ab3d15e22ae42468ad678a7bac1665b0e0efd8f01ec8a2e8d6838001a9484d0d22bed0a181376e05a2a347b126ceda8f96a026eb49fc134f7299a0013fb579a0
-
Filesize
1.2MB
MD5baad782146048e6a6938527bcc3933b0
SHA16fcd5ae25553fc9272cacc266899b3ea89c320ee
SHA2563e587375f8a883ea88878e986cc4ed143f89775ecc969342ffe1459eda89ffa2
SHA5122a385910c61a57317a23c9bbf920b36ddd793542f85e6d485888f4ac76cdb469f2470a7fddadada13938aa46a4fc5f3a5e82761f69f214e7d64cc2afeb6a82c5
-
Filesize
1KB
MD5022f1546dd9d16e5a2b752114d37b463
SHA15f9e9752759786077d4b24178a62d9a3753fb4cb
SHA2560ff3ebab0b8def8500de4032f42b6918776ae8848b1981dd67bc56ce0491bdd9
SHA512e4fe3c075cd3bdb832291cdf9fffc7e17cbd021945d8b6abe53a57725d3adcbb97da9088601e84caafdae092760079af9b71f859bfc8e6e6595ad3c2d52c791c
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
Filesize
42KB
MD5509f9513ca16ba2f2047f5227a05d1a8
SHA1fe8d63259cb9afa17da7b7b8ede4e75081071b1a
SHA256ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e
SHA512ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862