Analysis
-
max time kernel
152s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
09e345e03852dce614f9eca73b61b1a1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09e345e03852dce614f9eca73b61b1a1_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
09e345e03852dce614f9eca73b61b1a1_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
09e345e03852dce614f9eca73b61b1a1
-
SHA1
2aa0419cefd28af7e97a89d912ba3c4375897881
-
SHA256
394fcd54556c7c74118515fe23a2b666ea648ad9ee152a82fa8eefa200ccf4a6
-
SHA512
65b8f72e0d80f61882a384d50d4ce7698c5a04d39986449c6b064bbd06baa68a370211a1ca1c2aff235c8597cfbcd9a6b6b011e7833806d48616e30b3a7d1ecc
-
SSDEEP
24576:LuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:V9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1216-5-0x00000000027C0000-0x00000000027C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2636 iexpress.exe 2056 wusa.exe 568 Dxpserver.exe -
Loads dropped DLL 7 IoCs
pid Process 1216 Process not Found 2636 iexpress.exe 1216 Process not Found 2056 wusa.exe 1216 Process not Found 568 Dxpserver.exe 1216 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Madzpveq = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\KP3\\wusa.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1072 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2940 1216 Process not Found 29 PID 1216 wrote to memory of 2940 1216 Process not Found 29 PID 1216 wrote to memory of 2940 1216 Process not Found 29 PID 1216 wrote to memory of 2636 1216 Process not Found 30 PID 1216 wrote to memory of 2636 1216 Process not Found 30 PID 1216 wrote to memory of 2636 1216 Process not Found 30 PID 1216 wrote to memory of 2664 1216 Process not Found 31 PID 1216 wrote to memory of 2664 1216 Process not Found 31 PID 1216 wrote to memory of 2664 1216 Process not Found 31 PID 1216 wrote to memory of 2056 1216 Process not Found 32 PID 1216 wrote to memory of 2056 1216 Process not Found 32 PID 1216 wrote to memory of 2056 1216 Process not Found 32 PID 1216 wrote to memory of 2964 1216 Process not Found 33 PID 1216 wrote to memory of 2964 1216 Process not Found 33 PID 1216 wrote to memory of 2964 1216 Process not Found 33 PID 1216 wrote to memory of 568 1216 Process not Found 34 PID 1216 wrote to memory of 568 1216 Process not Found 34 PID 1216 wrote to memory of 568 1216 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\09e345e03852dce614f9eca73b61b1a1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\SN1k\iexpress.exeC:\Users\Admin\AppData\Local\SN1k\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2636
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\Ey5\wusa.exeC:\Users\Admin\AppData\Local\Ey5\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2964
-
C:\Users\Admin\AppData\Local\DOAKL4G37\Dxpserver.exeC:\Users\Admin\AppData\Local\DOAKL4G37\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e21d0b7be241ae16ebe5e0d1ac4738d1
SHA1e9b959a0bd2abbfcbd5822a4f7515f80dcbfdb28
SHA2563edfc492fbc205ff798d57c7497c585eb76d517cc7683de0c0bce2a794feeeac
SHA512eb22ab1eac95ba78270fe2ebf468b9cc40b9abde0fb71f9551be75beb29fb0785048f3c654dc6d7a282fee152e6cbb30db9f53739a12c4519041e33ca3356fdb
-
Filesize
1.2MB
MD59a2264bac37753c0b3cdeca9de0462e8
SHA1a19ef9c6602c9ff6ed20e68010204b304467ba87
SHA256db2c2f87223aeeb3a2da9df0e033f701c6d0afb53c892cd0efe403eea517ea6a
SHA5127bd918383f4f5ed513d94d5268f6dbe9fea6c5728581e87e9022e885fffa71c7f1ed01b6f87847612acc28e5316269af1f38be6d2b1296fea9c122c4bdd6deed
-
Filesize
1.2MB
MD5dfcb6cbe1f584fd3166abdf1244f40d9
SHA1b713e4e159dbadcb556b9ff42fb561c5e7d6000b
SHA256774eca53ad3fb4528b604e58ba5148d7d3917cae2227d53642e4a51bfd26aa54
SHA51293e18db4e99e44cd9f7003d7f51f617bc5ee3853fd13612ff7378459c44d7bbbb88110912171c7f88b42303159a8745b24711e9881fa796e9693bbf7d0fb5604
-
Filesize
1KB
MD55903a987047c7f09d3c90d29837cdbdc
SHA1cd41c24269163b46afb30fd62bb9d6be79bb92f0
SHA2569d867682b3348467c72e9add070e9ddadebe2ed48754b04edb342c3c0cd4a3a7
SHA5129e4013f1757b629aee38aca6afc635fbac31a514129922f5a0f5382004c97282ce35c4c4efee6e8ee0800be4627ef60395fe908a99347bcc5f48829a545aa82b
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
300KB
MD5c15b3d813f4382ade98f1892350f21c7
SHA1a45c5abc6751bc8b9041e5e07923fa4fc1b4542b
SHA2568f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3
SHA5126d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c
-
Filesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629