Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
16cc32046e3f43e3f81212459202d425
-
SHA1
bc204f585686521d375206fe3e5a2102386b8373
-
SHA256
2bfc8831b8af3293c743d4ee34b980c80195ce55d33ae89fbc3dabdaf73deef5
-
SHA512
2288176da59029620b0ab7afb03cd977595d70028d8f704c4ce7ee0593862607ff1fb4c12e4fff079d8e827e1859104ebc4363edfd55d697231722163dcc6aed
-
SSDEEP
24576:MuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:k9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x0000000002D30000-0x0000000002D31000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2924 Netplwiz.exe 2568 sdclt.exe 332 SystemPropertiesAdvanced.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2924 Netplwiz.exe 1204 Process not Found 2568 sdclt.exe 1204 Process not Found 332 SystemPropertiesAdvanced.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tlngny = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\IRnUx\\sdclt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2728 1204 Process not Found 31 PID 1204 wrote to memory of 2728 1204 Process not Found 31 PID 1204 wrote to memory of 2728 1204 Process not Found 31 PID 1204 wrote to memory of 2924 1204 Process not Found 32 PID 1204 wrote to memory of 2924 1204 Process not Found 32 PID 1204 wrote to memory of 2924 1204 Process not Found 32 PID 1204 wrote to memory of 2616 1204 Process not Found 33 PID 1204 wrote to memory of 2616 1204 Process not Found 33 PID 1204 wrote to memory of 2616 1204 Process not Found 33 PID 1204 wrote to memory of 2568 1204 Process not Found 34 PID 1204 wrote to memory of 2568 1204 Process not Found 34 PID 1204 wrote to memory of 2568 1204 Process not Found 34 PID 1204 wrote to memory of 2060 1204 Process not Found 35 PID 1204 wrote to memory of 2060 1204 Process not Found 35 PID 1204 wrote to memory of 2060 1204 Process not Found 35 PID 1204 wrote to memory of 332 1204 Process not Found 36 PID 1204 wrote to memory of 332 1204 Process not Found 36 PID 1204 wrote to memory of 332 1204 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\16cc32046e3f43e3f81212459202d425_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2728
-
C:\Users\Admin\AppData\Local\om7JUBodd\Netplwiz.exeC:\Users\Admin\AppData\Local\om7JUBodd\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2924
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\xQ47v\sdclt.exeC:\Users\Admin\AppData\Local\xQ47v\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2568
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:2060
-
C:\Users\Admin\AppData\Local\ssF\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\ssF\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d450a62060b1d2c342229e7c8dfeba57
SHA13bcba82b199ee7896b9d8ad46e220c3b00a59c63
SHA2569fd688d5ca082f09403288ad9b537fca2d90f809f74ea747b3f3ed2f8b5dd521
SHA51297c7d6dff74b01aa0739e349550be5a1ac2feaf22fc8f5a2ff70ae7dde329058f015250fc684ef03b7c212d4db9356caf56110ba86d748aab502e0e24e9bc165
-
Filesize
1.2MB
MD5d921a7867e0408318e5d3885290e7e1c
SHA10f5feb39130070113a1fc9a5e3fe478ef34a3256
SHA256ee5d81262ed3dd2c46f5a7e8652d3d425d2d1d0c8078713eff6bf85726d675b5
SHA5126e2a524e1821b8eef1dfe1f0e1c833f00e320260338c5393c858eccde4947217ea873860ba3818dd82a9f9894464105f902090fd658b36dc44f08299458f61bc
-
Filesize
1.2MB
MD5eaadb2f4b7a640c1ac5e9268f182fb84
SHA1ee288f85554c56ed2043fe9e188f2c297e281063
SHA256a676fa65f77476ed9e9b996aa410cfb625e23fea978f8fb8940995110676abd1
SHA5123e79a4a444a5dc35ada52b50c6ba13d7a5b958e60c545f28102a12cf1fd858fea44ae11fc222f1e361bf328ee156f34dd784f9350fcc25b0a3203d228893e019
-
Filesize
1KB
MD527a2e2121bf1882478a57a289d89dbb6
SHA101148d2a4d46782ca7881f914de8b44e625dd808
SHA25614f5408e5dbc6dffdc13673fd42b918ea480be6c15677aa80143888c2fc1e07a
SHA512718a536dade64a3834c70d2b31899bbd0d63969f5a4a1027d91a37871f77fbddb195da9df360fc480ae7bf6e976cf47fcad12b9e6085454f1eec8c49bb46c752
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08
-
Filesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13