Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
3419fa482b6568b8f57a109c37efbb6a_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
3419fa482b6568b8f57a109c37efbb6a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
3419fa482b6568b8f57a109c37efbb6a
-
SHA1
b7e9b700a063409acebaf68978058ccd1483a3b4
-
SHA256
de941aa21b4dc90656dc241719d3ce01cf582dc24404c2abec1c390b6214186c
-
SHA512
7d0fba934c86b69c988bf8ab8126099ec67d55d61135d96181695fa0d8d40fd048b587660fb45b1f6fe90819299b5e0a48d943f921eacdfa12637b2c44774c7c
-
SSDEEP
24576:RuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:D9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1124-5-0x0000000002D20000-0x0000000002D21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2896 FXSCOVER.exe 1672 sethc.exe 2956 sigverif.exe -
Loads dropped DLL 7 IoCs
pid Process 1124 Process not Found 2896 FXSCOVER.exe 1124 Process not Found 1672 sethc.exe 1124 Process not Found 2956 sigverif.exe 1124 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tlngny = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\Jb\\sethc.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1124 wrote to memory of 2904 1124 Process not Found 31 PID 1124 wrote to memory of 2904 1124 Process not Found 31 PID 1124 wrote to memory of 2904 1124 Process not Found 31 PID 1124 wrote to memory of 2896 1124 Process not Found 32 PID 1124 wrote to memory of 2896 1124 Process not Found 32 PID 1124 wrote to memory of 2896 1124 Process not Found 32 PID 1124 wrote to memory of 2664 1124 Process not Found 33 PID 1124 wrote to memory of 2664 1124 Process not Found 33 PID 1124 wrote to memory of 2664 1124 Process not Found 33 PID 1124 wrote to memory of 1672 1124 Process not Found 34 PID 1124 wrote to memory of 1672 1124 Process not Found 34 PID 1124 wrote to memory of 1672 1124 Process not Found 34 PID 1124 wrote to memory of 1716 1124 Process not Found 35 PID 1124 wrote to memory of 1716 1124 Process not Found 35 PID 1124 wrote to memory of 1716 1124 Process not Found 35 PID 1124 wrote to memory of 2956 1124 Process not Found 36 PID 1124 wrote to memory of 2956 1124 Process not Found 36 PID 1124 wrote to memory of 2956 1124 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3419fa482b6568b8f57a109c37efbb6a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2904
-
C:\Users\Admin\AppData\Local\OMxWLT4\FXSCOVER.exeC:\Users\Admin\AppData\Local\OMxWLT4\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2896
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\tpM\sethc.exeC:\Users\Admin\AppData\Local\tpM\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1672
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:1716
-
C:\Users\Admin\AppData\Local\IPjsmSRnH\sigverif.exeC:\Users\Admin\AppData\Local\IPjsmSRnH\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51366c60bc4027e97f49e64c949a265ef
SHA17f657750129f66c2ad7bd8beab5ec3a9eb2623b1
SHA2567e22cf358e3d239ae588f2e3b9dcdb565b054b9cac24fafb20b5dfaa6460446e
SHA5122faf0064b845d47737ce4bb79bb9c710bfadafd7d6dd706f71cfbdde2437417954cd565fd4c950389e8c10c4fe1e21d89dd916f132b0678bd387af8704642116
-
Filesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
Filesize
1.2MB
MD5fc570d76e4a051e3ca54ce40f35bdf6c
SHA14d69f16e122b92da892127edbc1702723fa3294e
SHA256e5c5168d2d017d6a53467801bdefd9517503c77893b8a92aebf0746e359c58d7
SHA512ddd20394add9c598dc0c74029610baf0a49c19ca8fbf169fea1880c096dae7cbb5fe822ef567f996094e5b09241be1a3e8a6c1923facdec25ebf8a3a0f9c3d7c
-
Filesize
1.2MB
MD573d56b845bac3cc1878e25df4fdd9fb8
SHA1b526e719983c070fbef2cc5c92d27c471b10476d
SHA2565eb7b35546cd7eecad11ae2b79f7f5b31554c59f65b4cf53a932c867d45d85a4
SHA512f5c780faa42318937e2f201a10fc24f7d48b528b9b650451834a0d74bafa89fd5a405e235835be9dcc92b7d99c6becbd9695733574fe9a7cac8970796c1d7571
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
Filesize
1024B
MD57527b95411f4ffebfdb8e3c85105f1eb
SHA1557af374617397fe8c056d0b92f41957315d8e9b
SHA2567f15d7b0a70adf98560bd3ef14bf9e99e3301f6be1cc44fb358fefaee85bae04
SHA5124a7a1909066978126ecc61cdc64da0b42c01ae17415d225759f8c13c5502b3eb54f8826f258b212e3c934f2d7cd6e9283f51fa28e52e3bc59d134e30da720c66
-
Filesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b