Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
2e03ac77d375deb5f78b2a2ea9f27b23_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
2e03ac77d375deb5f78b2a2ea9f27b23_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2e03ac77d375deb5f78b2a2ea9f27b23
-
SHA1
573d366ab1d2b5cf0450eb3d040b6a4f3c9e43ce
-
SHA256
90aaa47f51d7605218ee97cf17711d1dc9b238a6573ece4fe328489841874dc6
-
SHA512
e1d08ebeb363f2d9f5a89afec4424372553329a64fcc14bc0f181e8d8b06a6f2ece04c7dd76948b8c87d5003a8de87e0b00bc1f74107aef43ef409290b1f1bc1
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1188-5-0x0000000002530000-0x0000000002531000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2572 wisptis.exe 2672 recdisc.exe 1660 lpksetup.exe -
Loads dropped DLL 7 IoCs
pid Process 1188 Process not Found 2572 wisptis.exe 1188 Process not Found 2672 recdisc.exe 1188 Process not Found 1660 lpksetup.exe 1188 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lnxdhmhg = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\9tNah0\\recdisc.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2820 1188 Process not Found 31 PID 1188 wrote to memory of 2820 1188 Process not Found 31 PID 1188 wrote to memory of 2820 1188 Process not Found 31 PID 1188 wrote to memory of 2572 1188 Process not Found 32 PID 1188 wrote to memory of 2572 1188 Process not Found 32 PID 1188 wrote to memory of 2572 1188 Process not Found 32 PID 1188 wrote to memory of 2604 1188 Process not Found 33 PID 1188 wrote to memory of 2604 1188 Process not Found 33 PID 1188 wrote to memory of 2604 1188 Process not Found 33 PID 1188 wrote to memory of 2672 1188 Process not Found 34 PID 1188 wrote to memory of 2672 1188 Process not Found 34 PID 1188 wrote to memory of 2672 1188 Process not Found 34 PID 1188 wrote to memory of 2532 1188 Process not Found 35 PID 1188 wrote to memory of 2532 1188 Process not Found 35 PID 1188 wrote to memory of 2532 1188 Process not Found 35 PID 1188 wrote to memory of 1660 1188 Process not Found 36 PID 1188 wrote to memory of 1660 1188 Process not Found 36 PID 1188 wrote to memory of 1660 1188 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e03ac77d375deb5f78b2a2ea9f27b23_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\zHbW\wisptis.exeC:\Users\Admin\AppData\Local\zHbW\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2572
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\GEwsdSPt\recdisc.exeC:\Users\Admin\AppData\Local\GEwsdSPt\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2672
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵PID:2532
-
C:\Users\Admin\AppData\Local\j1ZLpi\lpksetup.exeC:\Users\Admin\AppData\Local\j1ZLpi\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56444f1c37bdc60ceb4a606cf4e91c49a
SHA16f65c3666428e6f22e14bea18fb1e20b257aa1ab
SHA256b090ce8a8c62151e524ada704ddd4abdc9da65916b9aa4426780b59d43db5478
SHA512c085cdc437db7c7216165fade461be94ad48aeaea7bc742742287f29875072473f9eb6ce615b954441ea4efddd24dcb6b7cf350966d84f7796cfdfd3e7a62c86
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
Filesize
1.2MB
MD5fc170288f2ccf25f296c17079013b349
SHA1f5f678ca979773d4ba2e7bd2b5f31c473045b72d
SHA256f724c6e486832271fca4bcca41b8cfeb226736facae09ba8ea62d407060ccb99
SHA51205f978a618ea0006244f67f116afe1eb2aeb85b2bc88dc008cceabe0b5de8c860264ee6e2d8ddbbd0453e604d92873f957e020c4a11df493db2d438e8cf2d658
-
Filesize
1KB
MD59d3164db97edbff96e14ad34acf1881a
SHA17059639330671e622f25a19a653948013fc3be45
SHA256dbd453ec4410e750577b3c6c31c6626316ba26ceb5b7da55e2caef5c25877b9c
SHA51257b18e4b301b40bcf64a3efed2e3a2436d04352430d02d943798397a20bc9cb21d813f5db445e38d58e382797ef2e67d8bc65ae580aa9c613a81826e990eea38
-
Filesize
1.2MB
MD532550215c419c7200fc47611925d5695
SHA1e5465ebf4d883b63a099dca0b243fc8e97e361fa
SHA256b1782a280c6e6915d84b685812f01a61c9d006d02d1d2897ba5458dbae8235e3
SHA512f836aa8220f85c023ff0aafe89452a58d68dec3a1f9b0003e99147d92496276ef8a41bbb74abd031b2eaa5994fc53b57168be6aa8c6b094a2e1fa9801e243812
-
Filesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
Filesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200