Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
305ed1795e2e32ab6474f11e8a2b90da_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
305ed1795e2e32ab6474f11e8a2b90da_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
305ed1795e2e32ab6474f11e8a2b90da
-
SHA1
36691323644bafb435d160a6d91caabba435a6de
-
SHA256
f2ddef77e116e27aaf7edd19d8e311c890be77abd321a104a19bb4beb6a760d5
-
SHA512
eab5c510385fef3fc598f15b65c6b91e966ba1590de17c839e4a5a9816526463f91501a5006209e781e15befd240ff7cdb53e57103dabd319483598926f85500
-
SSDEEP
24576:yuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:a9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2972 javaws.exe 1376 tabcal.exe 1628 dwm.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2972 javaws.exe 1200 Process not Found 1376 tabcal.exe 1200 Process not Found 1628 dwm.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\FbxkS5Y\\tabcal.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 rundll32.exe 2464 rundll32.exe 2464 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2876 1200 Process not Found 31 PID 1200 wrote to memory of 2876 1200 Process not Found 31 PID 1200 wrote to memory of 2876 1200 Process not Found 31 PID 1200 wrote to memory of 2972 1200 Process not Found 32 PID 1200 wrote to memory of 2972 1200 Process not Found 32 PID 1200 wrote to memory of 2972 1200 Process not Found 32 PID 1200 wrote to memory of 2716 1200 Process not Found 33 PID 1200 wrote to memory of 2716 1200 Process not Found 33 PID 1200 wrote to memory of 2716 1200 Process not Found 33 PID 1200 wrote to memory of 1376 1200 Process not Found 34 PID 1200 wrote to memory of 1376 1200 Process not Found 34 PID 1200 wrote to memory of 1376 1200 Process not Found 34 PID 1200 wrote to memory of 2996 1200 Process not Found 35 PID 1200 wrote to memory of 2996 1200 Process not Found 35 PID 1200 wrote to memory of 2996 1200 Process not Found 35 PID 1200 wrote to memory of 1628 1200 Process not Found 36 PID 1200 wrote to memory of 1628 1200 Process not Found 36 PID 1200 wrote to memory of 1628 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\305ed1795e2e32ab6474f11e8a2b90da_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2876
-
C:\Users\Admin\AppData\Local\6yOo\javaws.exeC:\Users\Admin\AppData\Local\6yOo\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2972
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:2716
-
C:\Users\Admin\AppData\Local\bnqkT\tabcal.exeC:\Users\Admin\AppData\Local\bnqkT\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1376
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2996
-
C:\Users\Admin\AppData\Local\X21rF\dwm.exeC:\Users\Admin\AppData\Local\X21rF\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD563e6b688d403d11efce3cd05fcd0719b
SHA15b0e6540bd6ebca0419a2fda0ffc76b208846ef0
SHA25611520bf9adb74b82a415ad31ef0267a0b5b242881cf81aa247d26bd185414872
SHA512ff19fe813dc0503f4f45945d65f97a89faa2ae6f702e39a6f2aa2f80604f7c0f069fe34825e322683fc9a15bc26e9b07a076662227e578a01f4afd9fa1f0c450
-
Filesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52
-
Filesize
1.2MB
MD520891eb0aa0f891a0fe88fb6ebaee555
SHA12cffb7f1c72cd80c856d35b6f09c9bf003645450
SHA2568e4e69400fc226c90d67e15a16a88a9fc0470aea974a2a6a9a0c7e7c6e40b656
SHA51221b00f1aa26aa0bef0d0a6396b4b41f9c1a3c0eaeccd5a39a90786994ff3ff9eb6b7554381a959c4f766971c1b13b8687c7cb1ad2129ebf5ab1155603277d8a9
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
1.2MB
MD5cdc1ae5eff46bbda45b706553ecbdc76
SHA19c0d2c71801d2746608cab02b0b3b23479a744c0
SHA256bb91e090a7e74d2e44f1b12cabce3caafda7599e3542b8ad43cc45b2d382058d
SHA512877fc1b24b8a138571df400f7dd86a926cbe16fa94636e629ff500278235a7dbdf65dd46ea6a85f9f7dc9efc873edb6f04477ccecb0f4673c71aa059db2b70e0
-
Filesize
988B
MD5833c6887239f5b5d373104fdb5d814d2
SHA15ec83418c44482aea0823f75934b243373b851c7
SHA2567f48185da6527ac68f0f0b58e72f713599c919d0e225ddefbe7a9f0720449620
SHA51260bc34b0c4a52bf5eebd6a9f6a6bb7079da065ea24a6dbe02d8d4fcaa7bb34970f44c0a412f11b10469a9d598c5e7ed248d053c83d99d762b26e9f231d1e5f30
-
Filesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6