Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7ef24c1f5e48c05ea044e0526927416a
-
SHA1
a6d769d027f54f788a6b4d81050de84b8250d948
-
SHA256
604afec896aa6be5676ddf766bcf16e56c6822c5078cc40480bee754b305ff8c
-
SHA512
6cedb29f93c705d9125d4acfc45c827ff06a703f21fbf650a204f20b0e0c9110eaf429e69dfcd96a0e10121849219494e523ec610fa3669719aa8d64ef29d583
-
SSDEEP
24576:LuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:V9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1208-5-0x0000000002F10000-0x0000000002F11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 1900 rdrleakdiag.exe 664 iexpress.exe 276 spreview.exe -
Loads dropped DLL 7 IoCs
pid Process 1208 Process not Found 1900 rdrleakdiag.exe 1208 Process not Found 664 iexpress.exe 1208 Process not Found 276 spreview.exe 1208 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\YLlz765FHH\\iexpress.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdrleakdiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 regsvr32.exe 2584 regsvr32.exe 2584 regsvr32.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2780 1208 Process not Found 31 PID 1208 wrote to memory of 2780 1208 Process not Found 31 PID 1208 wrote to memory of 2780 1208 Process not Found 31 PID 1208 wrote to memory of 1900 1208 Process not Found 32 PID 1208 wrote to memory of 1900 1208 Process not Found 32 PID 1208 wrote to memory of 1900 1208 Process not Found 32 PID 1208 wrote to memory of 2264 1208 Process not Found 33 PID 1208 wrote to memory of 2264 1208 Process not Found 33 PID 1208 wrote to memory of 2264 1208 Process not Found 33 PID 1208 wrote to memory of 664 1208 Process not Found 34 PID 1208 wrote to memory of 664 1208 Process not Found 34 PID 1208 wrote to memory of 664 1208 Process not Found 34 PID 1208 wrote to memory of 2044 1208 Process not Found 35 PID 1208 wrote to memory of 2044 1208 Process not Found 35 PID 1208 wrote to memory of 2044 1208 Process not Found 35 PID 1208 wrote to memory of 276 1208 Process not Found 36 PID 1208 wrote to memory of 276 1208 Process not Found 36 PID 1208 wrote to memory of 276 1208 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
C:\Windows\system32\rdrleakdiag.exeC:\Windows\system32\rdrleakdiag.exe1⤵PID:2780
-
C:\Users\Admin\AppData\Local\ELTvYN\rdrleakdiag.exeC:\Users\Admin\AppData\Local\ELTvYN\rdrleakdiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1900
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:2264
-
C:\Users\Admin\AppData\Local\zZWBXNn\iexpress.exeC:\Users\Admin\AppData\Local\zZWBXNn\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:664
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2044
-
C:\Users\Admin\AppData\Local\WUPI5ylp\spreview.exeC:\Users\Admin\AppData\Local\WUPI5ylp\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56cc254d31580defe7f9eb6f4a4581d98
SHA10337b740bbbec7cb728cd5a43a8440b19ec7b5a7
SHA2567db1b8aa4a659a98bdff19816a6ca37251d12ff8e46932e25716a31f06affb15
SHA512148f5f1ed9d0c264fe6c9dfdda8e0754871173a3532a778131d1cc5ac64c5c1f700551605402340d043834c14be3f09cae939eaa575ead0578380f20fbeeecc7
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
1.2MB
MD585c4e0fe52fc81009ef731b736dcf64e
SHA18f17a5075ace5986d7fbb8cacf4f2e8b0d1d0231
SHA256f4d5c617fa2210db6a01b1736c7bfec68d02d00e71e6fbb40110d2b91e9eee22
SHA512f3122d65ed4098dd0907518b8cd39301542d3c1b2d6977757fee614dc52b4936dba4a0bc5e6088934b69260034b684572ee06a0b6f1cb67fee396dbd69bd997c
-
Filesize
1.2MB
MD5ec6e9ba5ed7f8e71c86f9d66440c93ce
SHA1212fc8a98e2ba0db0e1b1da6b87c2ef01cd6f8fd
SHA256fdf443a752bd198fd7c259f180bacc913d1114bcb5636c04862779414ca27442
SHA5122ecdf0964b468b3995c2081659c7f02afabe6bf4e1b81cb0df47ef440e0588dd974ea645b441f4e0afe5ee08845fabd7c761a554534fa9b5437f435dea491442
-
Filesize
1KB
MD5b5166223bc5e0348f49c05ac119bfbc4
SHA17633bbbd81f7f820f1e191134bff882bbded1082
SHA2567356bc11da2261d871b9722a3fa1aa53057c1fe3c6286ed64c5b60083062d82c
SHA51201c9d5eb1c28e18f60f96f02706d66a21e1b69e0a8e04a4c693c83618004d243221746db8e94112d43365a556b936fafebfcc49a94a07f0f8f2916fdb201eedd
-
Filesize
39KB
MD55e058566af53848541fa23fba4bb5b81
SHA1769ce3bfc45e4d56ed01dbeeeca7be22f9b9eed6
SHA256ae83b050fa722da7e4b19fc3d534f0126b1ec055643bb1f267b85b55160f4409
SHA512352029cf0af7583a4c525cfd1da7467446bac410a885b2768d8052f39577ccce85b21d5bd946be6bf8341e7308c8e4f645e4d79232b93aaf6a92d6cd55f598d0
-
Filesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629