Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
1fcda2221e8944f12e34e61b96fbf88f_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
1fcda2221e8944f12e34e61b96fbf88f_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
1fcda2221e8944f12e34e61b96fbf88f
-
SHA1
c26145b0db9ad0248dfddd89daa1894826069a39
-
SHA256
a2d0319fed40865b788210013d7a165b8a3d7ec6bb847d4529dbf2ba073a8f2e
-
SHA512
d9013272340b574863dafb98738d70037fd279a809c9c4f5e898540c5fbd59fe53ce2aa545a03d3ebdcc922dc8da13f5a781624e1d858bb7784d59cb3322ae0d
-
SSDEEP
24576:7uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:l9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1404-5-0x0000000002DA0000-0x0000000002DA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2872 winlogon.exe 3060 slui.exe 2068 irftp.exe -
Loads dropped DLL 7 IoCs
pid Process 1404 Process not Found 2872 winlogon.exe 1404 Process not Found 3060 slui.exe 1404 Process not Found 2068 irftp.exe 1404 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\o9he3rBH\\slui.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA irftp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2944 1404 Process not Found 29 PID 1404 wrote to memory of 2944 1404 Process not Found 29 PID 1404 wrote to memory of 2944 1404 Process not Found 29 PID 1404 wrote to memory of 2872 1404 Process not Found 30 PID 1404 wrote to memory of 2872 1404 Process not Found 30 PID 1404 wrote to memory of 2872 1404 Process not Found 30 PID 1404 wrote to memory of 2444 1404 Process not Found 31 PID 1404 wrote to memory of 2444 1404 Process not Found 31 PID 1404 wrote to memory of 2444 1404 Process not Found 31 PID 1404 wrote to memory of 3060 1404 Process not Found 32 PID 1404 wrote to memory of 3060 1404 Process not Found 32 PID 1404 wrote to memory of 3060 1404 Process not Found 32 PID 1404 wrote to memory of 1952 1404 Process not Found 33 PID 1404 wrote to memory of 1952 1404 Process not Found 33 PID 1404 wrote to memory of 1952 1404 Process not Found 33 PID 1404 wrote to memory of 2068 1404 Process not Found 34 PID 1404 wrote to memory of 2068 1404 Process not Found 34 PID 1404 wrote to memory of 2068 1404 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1fcda2221e8944f12e34e61b96fbf88f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:2944
-
C:\Users\Admin\AppData\Local\6J9\winlogon.exeC:\Users\Admin\AppData\Local\6J9\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2872
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2444
-
C:\Users\Admin\AppData\Local\kbOZax2f\slui.exeC:\Users\Admin\AppData\Local\kbOZax2f\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3060
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:1952
-
C:\Users\Admin\AppData\Local\Fi63hL4K\irftp.exeC:\Users\Admin\AppData\Local\Fi63hL4K\irftp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57fd58afab1aa4f231ed3d973d84c7fea
SHA1d47d3dabbce6522b5d4d5c8621a9f5f7d221e9df
SHA256f7f6f3792ac91578528e39e3c5afe6a9321e3746a8e1cfafdec8bd5ffeb03ac0
SHA5120b0d42686d74df6089f5fd9a58da36e7cf7ce03756dfd67780c99fe5c74b05725a9885506af839c488ec652f41380ddb45e76f4652237da6167dabd208f5461a
-
Filesize
1.2MB
MD59c450818f99ffde13565eaadb4caa8a2
SHA1319170823a3dd8810c51a28d4b1c5761e8494196
SHA256abba416eecccfdd925eea41d9d93acb5c0f59f7ff4d67303df50de95d3717f44
SHA512abf9e28665463d91698d83632d61dbbd14d5e746fe8a9978e366b94a0394cc69c05e85fa8b72e2fa8b5922b238d1f42e997491dfa6f08cbda6edc47061087a5f
-
Filesize
1.2MB
MD5a0d80184c86aa394c793eb960db6d80c
SHA11e4a0c232a2c236c14caf5b4358798afcbc19895
SHA256b71837efe3ce3b092baaa6762dc772848a2e8f26e264a9e829b31b153070e50f
SHA5129f562a2583174e01301a4e047259adb1bc2c7d9cdb19f4f89f3f6fe110f70e65e6380e890f191ce9625b57416debfe8b823177d14d67b6d068d9b19372908c4a
-
Filesize
1KB
MD5b2b5ef2e571d2aeff22b3fcbe8f1e3fc
SHA187ee018391b3b052e154342bf8807e87f34ea447
SHA256cf567472c814f47488feac46d97db65f7809d4146e8c22dc05c863a0c7a875dc
SHA512a8391a04c77e7f2e27aff509d8baec50e12bf510a45a8dc3fb57db99dd339ab56c31ff9d71449f990c06e6453f464c5831fc378469dbc3a30bd80e9e0da92ce1
-
Filesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c