Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
21c141dcb53d6e92c947f3fe480a267d_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
21c141dcb53d6e92c947f3fe480a267d_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
21c141dcb53d6e92c947f3fe480a267d
-
SHA1
2d12b1a6bc68b02c4df842f01afb3a0b97a2b901
-
SHA256
8506a0be38a93d9236db2fbb42a97fc10e6fa42dc77ac6a5ed35476bd30f2574
-
SHA512
87fb19f6bf66d1c67e43d22c6db0ec22318749cc7be0e9b7e6e5809ec23245bf5f2b96713a3fe8055c7f2cc4174407fe95d285283791655b07d06cff1e3d9b41
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002E40000-0x0000000002E41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2776 Dxpserver.exe 1536 tcmsetup.exe 2920 perfmon.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2776 Dxpserver.exe 1200 Process not Found 1536 tcmsetup.exe 1200 Process not Found 2920 perfmon.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\{DC37FE79-C4CA-4193-B626-B1B05FF7331E}\\nRR\\tcmsetup.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2656 1200 Process not Found 31 PID 1200 wrote to memory of 2656 1200 Process not Found 31 PID 1200 wrote to memory of 2656 1200 Process not Found 31 PID 1200 wrote to memory of 2776 1200 Process not Found 32 PID 1200 wrote to memory of 2776 1200 Process not Found 32 PID 1200 wrote to memory of 2776 1200 Process not Found 32 PID 1200 wrote to memory of 1788 1200 Process not Found 33 PID 1200 wrote to memory of 1788 1200 Process not Found 33 PID 1200 wrote to memory of 1788 1200 Process not Found 33 PID 1200 wrote to memory of 1536 1200 Process not Found 34 PID 1200 wrote to memory of 1536 1200 Process not Found 34 PID 1200 wrote to memory of 1536 1200 Process not Found 34 PID 1200 wrote to memory of 1968 1200 Process not Found 35 PID 1200 wrote to memory of 1968 1200 Process not Found 35 PID 1200 wrote to memory of 1968 1200 Process not Found 35 PID 1200 wrote to memory of 2920 1200 Process not Found 36 PID 1200 wrote to memory of 2920 1200 Process not Found 36 PID 1200 wrote to memory of 2920 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21c141dcb53d6e92c947f3fe480a267d_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\5b1zUhd6u\Dxpserver.exeC:\Users\Admin\AppData\Local\5b1zUhd6u\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2776
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:1788
-
C:\Users\Admin\AppData\Local\wQZxf\tcmsetup.exeC:\Users\Admin\AppData\Local\wQZxf\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1536
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:1968
-
C:\Users\Admin\AppData\Local\pPYcSU\perfmon.exeC:\Users\Admin\AppData\Local\pPYcSU\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fc397de7f8b9620955bdc2d9d46e4a87
SHA148e9c74906cd99a767526ba68c16671d300be321
SHA256f4e228c3c8df1720af2a03fbae4da06bf1880388320d067af41d722c0a621fb5
SHA512003772b965ef09928e4cc7cb51b326ae3e067d261c55c06342b352468f99ea4fdeca4a9637184790c8226b5927a155c651eaa572c1206d26e92c08a6b66c307f
-
Filesize
1.2MB
MD532a1a4e86e5b8463f24fcdd349e7902f
SHA1df96e2908706788e47db23d7915ab2038e1a109a
SHA25690da832b44ba3d086fcc252fcd90c1754db61008fea67c8c9c359bfd8e0d4263
SHA5123437ba4f76a0ebd58f197339242983bdfac52954824fb83c0dc29da3f8ba121211c8a6a90a0f1a52da30be6c7d04437f66004305a7ba846fffec0b8e39845a43
-
Filesize
1.2MB
MD57da2e32717c2bd2ccdf75ab4fbc64740
SHA1080430f1331cb2a08871e547fd1b3242373f4bdb
SHA256cd4f2f8c0a03a77265ff17497c0b6c6053d810f3bd9d19634bc439e86d63615c
SHA5128ac87288b003cc575944cc34087140af7f128cf2d323b32c0a09560da87569b6eb68f73d861ddb4e26eecc8c56539bb597f479d6ff6e6bc234fb665fbe5b0fd1
-
Filesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
Filesize
1KB
MD5ff57f08f34d4c464ed29d50780f3cd5a
SHA19bc08b216b8cac91f2510760ab6c36a55da0b999
SHA2569afcdb8a1c41f92d2cf13981006bccb323b80c76de4a9cacfc3dfd13a63f645e
SHA512fd6ff4c5c724c75ac1569e959c65c1c19de2190243dcf4ff2b0975878453fd1dcbe7612cc4d17d1a28fc08b87e488a3468b01a2f7a322c9760ea4f1e637db58f
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35