Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
31a99257d7f59c024665683ec80d1f5f_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
31a99257d7f59c024665683ec80d1f5f_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
31a99257d7f59c024665683ec80d1f5f
-
SHA1
61d6669a7e007b64b69bdf93d0a39f232fc3e7e4
-
SHA256
8cc5917a2fe27efc03ea4cdcc77b00fa7a8551f38d393735ebc0923a87961edd
-
SHA512
c4fd03de3aedf2ae3bc58a744080b13ade5b66617046b33458ab11fc77b22d743f7144eb7705e97be0bad7a0844f643e5af901d07a1eab50ea8de79cc4c6da79
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002560000-0x0000000002561000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
EhStorAuthn.exeirftp.execalc.exepid Process 3032 EhStorAuthn.exe 1424 irftp.exe 2992 calc.exe -
Loads dropped DLL 7 IoCs
Processes:
EhStorAuthn.exeirftp.execalc.exepid Process 1200 3032 EhStorAuthn.exe 1200 1424 irftp.exe 1200 2992 calc.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qiarkhdaw = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\9fCD\\irftp.exe" -
Processes:
rundll32.exeEhStorAuthn.exeirftp.execalc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA irftp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA calc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1820 rundll32.exe 1820 rundll32.exe 1820 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2772 1200 31 PID 1200 wrote to memory of 2772 1200 31 PID 1200 wrote to memory of 2772 1200 31 PID 1200 wrote to memory of 3032 1200 32 PID 1200 wrote to memory of 3032 1200 32 PID 1200 wrote to memory of 3032 1200 32 PID 1200 wrote to memory of 836 1200 33 PID 1200 wrote to memory of 836 1200 33 PID 1200 wrote to memory of 836 1200 33 PID 1200 wrote to memory of 1424 1200 34 PID 1200 wrote to memory of 1424 1200 34 PID 1200 wrote to memory of 1424 1200 34 PID 1200 wrote to memory of 1448 1200 35 PID 1200 wrote to memory of 1448 1200 35 PID 1200 wrote to memory of 1448 1200 35 PID 1200 wrote to memory of 2992 1200 36 PID 1200 wrote to memory of 2992 1200 36 PID 1200 wrote to memory of 2992 1200 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a99257d7f59c024665683ec80d1f5f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵PID:2772
-
C:\Users\Admin\AppData\Local\DOp\EhStorAuthn.exeC:\Users\Admin\AppData\Local\DOp\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3032
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:836
-
C:\Users\Admin\AppData\Local\vRf\irftp.exeC:\Users\Admin\AppData\Local\vRf\irftp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1424
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe1⤵PID:1448
-
C:\Users\Admin\AppData\Local\dWlZ8NQ7I\calc.exeC:\Users\Admin\AppData\Local\dWlZ8NQ7I\calc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c0ae21402095dec91e5a81a5343f0bd6
SHA16894845066a9102f815da97b46013ba52814d0a5
SHA256212b6cc4b2740f6561000f11061a8b2c0828f1bc36b67f2a03713cee10e9d837
SHA512afeb434843c09870eae6f2fe6ea156530ae06e59740915259deaeee566d43247151bbfc9e8cd45cc671193bac0246e54fe049d5f52bff65a2f7950966ade01e1
-
Filesize
1.2MB
MD5448dce67366df3349e4f6b9d1f9313b6
SHA16480190fb7c5f131d8862f37afd37fcb2f8933f6
SHA2563f17fa678cc16efcc039ae801d14824b781bab09e5691d3962d32f329b29dee9
SHA512200837aaa419a1935ba5fbebf859ad8ddcb4fb1d2c4b008601654b3f6d38fe2cf58164ea95b79f7229c36aefb967e881c9476c31b18a7bcf3d7a4f3ca4c8ea6e
-
Filesize
1KB
MD5c6f7ec8aba6d22b18b95e712c5ebc7c5
SHA1a81136ef7945bc33f8c569ca1ff42307be5af9e8
SHA256f635a2867529ac9124f64b7fbe9b8c2d67d9c175a0ac943b09e772b3cef22e56
SHA512f9ce59e273b2034d1315aab30d66be7a160fa2f13fc547eea3238b60b993a7874a44e3d006322b41844c3588af9b64a47094e4e92cee349eb01e97a08ba870c3
-
Filesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
Filesize
1.2MB
MD53b27380ad32fd0fd896ccbd36731e43f
SHA1e501236a67af5f9fff7feb05655d2cc03bbbdf29
SHA25661561b077a8007b13f56ca32e57faafcd287b40727d90bc22fa85dd7cecbe732
SHA5127d1fe2cc7d1582b5c500e1c085042f2eeccf21798e7cbccacaab96ccf8bc0f083a25e90f24b8288f3feb3c1e1d3d813b8886f622147cbc22889d5d67d168da19
-
Filesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec