Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
15410936b47cef7dec131527c79b6f17
-
SHA1
34f01700b66c8e13d358c5ef4d93a3b15a7a0cb1
-
SHA256
5267301c0c47dcaaa430b438ee7498235950f67cbcb1042dc0a69a9912a736ee
-
SHA512
13116d07c0e0aacff8ac9358b1e634f81ae0b8101c49b25f2a66b2cac4b672eb0c8d5238ca7d8df50fc159d839dd33f16e7887fc1f6b0fef6f02365f2a20bf3e
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1212-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2768 isoburn.exe 1752 raserver.exe 2948 rdpclip.exe -
Loads dropped DLL 7 IoCs
pid Process 1212 Process not Found 2768 isoburn.exe 1212 Process not Found 1752 raserver.exe 1212 Process not Found 2948 rdpclip.exe 1212 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\GOOO0Q~1\\raserver.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 rundll32.exe 2112 rundll32.exe 2112 rundll32.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2924 1212 Process not Found 31 PID 1212 wrote to memory of 2924 1212 Process not Found 31 PID 1212 wrote to memory of 2924 1212 Process not Found 31 PID 1212 wrote to memory of 2768 1212 Process not Found 32 PID 1212 wrote to memory of 2768 1212 Process not Found 32 PID 1212 wrote to memory of 2768 1212 Process not Found 32 PID 1212 wrote to memory of 2308 1212 Process not Found 33 PID 1212 wrote to memory of 2308 1212 Process not Found 33 PID 1212 wrote to memory of 2308 1212 Process not Found 33 PID 1212 wrote to memory of 1752 1212 Process not Found 34 PID 1212 wrote to memory of 1752 1212 Process not Found 34 PID 1212 wrote to memory of 1752 1212 Process not Found 34 PID 1212 wrote to memory of 2704 1212 Process not Found 35 PID 1212 wrote to memory of 2704 1212 Process not Found 35 PID 1212 wrote to memory of 2704 1212 Process not Found 35 PID 1212 wrote to memory of 2948 1212 Process not Found 36 PID 1212 wrote to memory of 2948 1212 Process not Found 36 PID 1212 wrote to memory of 2948 1212 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15410936b47cef7dec131527c79b6f17_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:2924
-
C:\Users\Admin\AppData\Local\1Jyg6bwN\isoburn.exeC:\Users\Admin\AppData\Local\1Jyg6bwN\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2768
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2308
-
C:\Users\Admin\AppData\Local\x82iW2rl\raserver.exeC:\Users\Admin\AppData\Local\x82iW2rl\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1752
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Local\i1cf5I\rdpclip.exeC:\Users\Admin\AppData\Local\i1cf5I\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ecad7e776faa522be7c6e446e08e14e0
SHA1af8d568e36e0fb738bf437b8316b4d842d0b09f4
SHA256224aaf4b70b690268a7e4b218eb531c8524517fc9f0961c585d23567abbe73ba
SHA512a8a70124549f8bdc8bb8db4a2e9f36f47235e19ea0723d9ae2faee07882e653e5f02509e3377fb02fd67780b255dfc844b22c6f38d1e92f4e98ae7fdd13a6de5
-
Filesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa
-
Filesize
1.2MB
MD5f2d654f74a8341361c74109bfcfc35e2
SHA1eda74d158a9d93b485af153a469bf768ce8d19bd
SHA25606a6d977096d94e8cdb9d74a52dbbe4d1e344c269bc4a566dc04db244970bf31
SHA51270418a6957a9f7bafd55889f1f4ddb9b7ddf2e720e38064712958b85b3a3ceae1f6a119f7ecfff862810d47af0aab6f6bfc534dda2bc30b0ab857f6f3a42b148
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
1.2MB
MD597b8039357aff4d62376312ba45aceab
SHA17e28bbb8d56cdb82c60c34648e59c4f9f86c26a7
SHA256cdc3a684f646d516ab9ccc922f9d6365241a90cfef97f0934fed3f74e33469b0
SHA5120b26e0af3407bd9287f554bb3d73e540ea693f0f587ec52da8193b266b9b67c3669d5586d902f9478c90a415469a5816fe61426e3bfb8eb047dd76c92c62a9d5
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
1KB
MD5f20b27fb133d54bfea9e766ce6e25d82
SHA1e3035626775029e933b3e403b832b9503bba69d1
SHA2568a2ad7886b41d57f354e352fbc49fb92c83f62bab0de5c4ad08e3816907c39fe
SHA512fe060f7d0c38d8ed4bc47a32ee4b3f40c87ea5f5cbdc20a2bd7bbb6cb1aa9d910476f2dc3be78727c689fbca42ab99f1ffb43424f2354a83054b67d630862b2a