Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
20820c2a9bf906522a7592b6a394f25c_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
20820c2a9bf906522a7592b6a394f25c_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
20820c2a9bf906522a7592b6a394f25c
-
SHA1
9468c6497d136660b8349d1748ba71152b749509
-
SHA256
0837def50bbee311ec7d43a7769cea5a285fee80fc6cf2a9796573cb400bf4e8
-
SHA512
6cefdee4fbb47b90237dc4a57f1c568f03de10963357fc6d319e2f9566a592f5605f4113dc471afc87329199cdecdf7a70b170d6af50be36e322ed7c4eb8d152
-
SSDEEP
24576:XuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:Z9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1344-5-0x00000000025C0000-0x00000000025C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2848 isoburn.exe 860 winlogon.exe 2536 sdclt.exe -
Loads dropped DLL 7 IoCs
pid Process 1344 Process not Found 2848 isoburn.exe 1344 Process not Found 860 winlogon.exe 1344 Process not Found 2536 sdclt.exe 1344 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wsagbppvydnjcs = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\qg\\winlogon.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 rundll32.exe 2232 rundll32.exe 2232 rundll32.exe 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1976 1344 Process not Found 30 PID 1344 wrote to memory of 1976 1344 Process not Found 30 PID 1344 wrote to memory of 1976 1344 Process not Found 30 PID 1344 wrote to memory of 2848 1344 Process not Found 31 PID 1344 wrote to memory of 2848 1344 Process not Found 31 PID 1344 wrote to memory of 2848 1344 Process not Found 31 PID 1344 wrote to memory of 2400 1344 Process not Found 32 PID 1344 wrote to memory of 2400 1344 Process not Found 32 PID 1344 wrote to memory of 2400 1344 Process not Found 32 PID 1344 wrote to memory of 860 1344 Process not Found 33 PID 1344 wrote to memory of 860 1344 Process not Found 33 PID 1344 wrote to memory of 860 1344 Process not Found 33 PID 1344 wrote to memory of 2060 1344 Process not Found 34 PID 1344 wrote to memory of 2060 1344 Process not Found 34 PID 1344 wrote to memory of 2060 1344 Process not Found 34 PID 1344 wrote to memory of 2536 1344 Process not Found 35 PID 1344 wrote to memory of 2536 1344 Process not Found 35 PID 1344 wrote to memory of 2536 1344 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20820c2a9bf906522a7592b6a394f25c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:1976
-
C:\Users\Admin\AppData\Local\68pVza2r\isoburn.exeC:\Users\Admin\AppData\Local\68pVza2r\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2848
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:2400
-
C:\Users\Admin\AppData\Local\CvXvfrRd7\winlogon.exeC:\Users\Admin\AppData\Local\CvXvfrRd7\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:860
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:2060
-
C:\Users\Admin\AppData\Local\KgO8qOtBD\sdclt.exeC:\Users\Admin\AppData\Local\KgO8qOtBD\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD571caa990207cb9f995158378cb73f671
SHA151e6eb871654228aa94d3931bb8f1eeb5f0a6f59
SHA256f20695069d7dcf8d5daefc3cd87b9a59ccc5d1cce6581387975aadc1725d79ae
SHA51224c46dd560508d7ba4069bdd0847a5f24caec3ce9ac0f772d90c3ef5ea014005576192e8515c8ef17100ab4367f079d210cb7c077ea2b0500b5cff24aeb3b19f
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
1.2MB
MD5a1845a7c9ae1e1522f48bb73f1497190
SHA177c7a2fe9273530ff3700e8a7f105638a2dbf261
SHA25609acb6ace44836a619b1f3fb2e80ac55c077dda0f2f6678a5510e89261d3918f
SHA512d87719488270ddcdc8cca2f454accc2a12ae6e91c522bdd94f53f72128ac620c27423b81c2fe818e857b14f556fba54dade379dbd3aeda0495a348c2d722b153
-
Filesize
1KB
MD50744d1c75f4e575e372be8588ca10367
SHA1c1381f87f0e5e45847ece170619aed1be97f41fb
SHA256d5b8bb79148a4fba0fd60db843ae3931762570a61937a25915ccfe2926942396
SHA512eb6f37350828032b1f499471f06393d691f1b91b66d42a981584fa19939e48fc08c8ed895ee703059ad3594c22247810276f59736c145afa51acac6d8d58a89b
-
Filesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa
-
Filesize
1.2MB
MD5413c9bb1e63ebe4b947dcea6ae5e78e3
SHA149c757d7c98fc19fbb73534caa8593f45a7d3b51
SHA256b0870fcd35ba351a485c9dbd1860d4bf73d3b3303a73f67ec1f6af7a0838c0d3
SHA512d5ed28d8d177cfd93cd094bf82f9b444bdb426ba9e2ce695accec16b9dff7898b03b9dcf1ffedb0daa7202ded30cbf2b71ab522b05380faa17e8525fda152903
-
Filesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab