Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
7ef24c1f5e48c05ea044e0526927416a
-
SHA1
a6d769d027f54f788a6b4d81050de84b8250d948
-
SHA256
604afec896aa6be5676ddf766bcf16e56c6822c5078cc40480bee754b305ff8c
-
SHA512
6cedb29f93c705d9125d4acfc45c827ff06a703f21fbf650a204f20b0e0c9110eaf429e69dfcd96a0e10121849219494e523ec610fa3669719aa8d64ef29d583
-
SSDEEP
24576:LuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:V9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3460-4-0x0000000002440000-0x0000000002441000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 372 perfmon.exe 3964 CustomShellHost.exe 1460 DWWIN.EXE -
Loads dropped DLL 3 IoCs
pid Process 372 perfmon.exe 3964 CustomShellHost.exe 1460 DWWIN.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ofwfdysxg = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\EGKQZB~1\\CUSTOM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CustomShellHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 696 regsvr32.exe 696 regsvr32.exe 696 regsvr32.exe 696 regsvr32.exe 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3424 3460 Process not Found 81 PID 3460 wrote to memory of 3424 3460 Process not Found 81 PID 3460 wrote to memory of 372 3460 Process not Found 82 PID 3460 wrote to memory of 372 3460 Process not Found 82 PID 3460 wrote to memory of 2332 3460 Process not Found 83 PID 3460 wrote to memory of 2332 3460 Process not Found 83 PID 3460 wrote to memory of 3964 3460 Process not Found 84 PID 3460 wrote to memory of 3964 3460 Process not Found 84 PID 3460 wrote to memory of 1088 3460 Process not Found 85 PID 3460 wrote to memory of 1088 3460 Process not Found 85 PID 3460 wrote to memory of 1460 3460 Process not Found 86 PID 3460 wrote to memory of 1460 3460 Process not Found 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7ef24c1f5e48c05ea044e0526927416a_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:3424
-
C:\Users\Admin\AppData\Local\ckVh\perfmon.exeC:\Users\Admin\AppData\Local\ckVh\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:372
-
C:\Windows\system32\CustomShellHost.exeC:\Windows\system32\CustomShellHost.exe1⤵PID:2332
-
C:\Users\Admin\AppData\Local\TCk3CVs\CustomShellHost.exeC:\Users\Admin\AppData\Local\TCk3CVs\CustomShellHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3964
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:1088
-
C:\Users\Admin\AppData\Local\IrJkJ0\DWWIN.EXEC:\Users\Admin\AppData\Local\IrJkJ0\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5444cc4d3422a0fdd45c1b78070026c60
SHA197162ff341fff1ec54b827ec02f8b86fd2d41a97
SHA2564b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0
SHA51221742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553
-
Filesize
1.2MB
MD50c449e2e82cc89bf03cce1d61675fcc0
SHA1ee403c0f8bc1bfe53a3187636a05606bf02b0909
SHA256e1290c1dbd89d785b9a16aefac9aff59b6817d3ca67ea794876677a8467bdcef
SHA512be550d00501b5db7d36ab28e7fffa54920a4d476b799e6f5def3cfa5ef1fc5c73f78e3234f959ca661166c83fcb4d5eff3918ea4fa6dbc0c3c1a46fb7f8f8b6a
-
Filesize
835KB
MD570400e78b71bc8efdd063570428ae531
SHA1cd86ecd008914fdd0389ac2dc00fe92d87746096
SHA25691333f3282a2420359ae9d3adf537688741d21e964f021e2b152ab293447f289
SHA51253005dda237fb23af79f54779c74a09835ad4cad3ca7b9dcec80e3793a60dd262f45b910bef96ab9c8e69d0c6990fea6ca5fee85d7f8425db523ae658372959e
-
Filesize
1.2MB
MD5f59f4cad069d8cc92d72240b6134cd09
SHA19d2c6b0fd3360b8b1f68655a085c7a3d7a661d39
SHA256fab67fc34f93a4152da93adbf0d13adc48787fa2a84baf39e66d338c89509e00
SHA512541cf5308df72bc81dd0de33d03fd10c3023b4e9701ffa93192c3904f4cb6ca63aa97e7ced5e3c614f06e696bd8735ec2cf497d5ce6e64bb283813c6945352db
-
Filesize
1.2MB
MD58f681e84f9b40ea43da0b3901b7fd946
SHA193a7766145f7eb744efdc2d32533f42874140837
SHA25624e4b9d13432c59ca5cb10c8e9e1405bc25392d5eed8c1b105947183efb19a09
SHA51292a5653e9255d6f1c2d31eaf365f6b9e49d418d9ca8c5415fecde9f76a4f05550840921985a20361b6a04cdce5b5bcb49aba57923c3509cd962b3c291a30caa8
-
Filesize
177KB
MD5d38aa59c3bea5456bd6f95c73ad3c964
SHA140170eab389a6ba35e949f9c92962646a302d9ef
SHA2565f041cff346fb37e5c5c9dab3c1272c76f8b5f579205170e97d2248d04a4ea0c
SHA51259fa552a46e5d6237c7244b03d09d60e9489217b4319a212e822c73fe1f31a81837cb906ae7da92072bd3d9263fe0b967e073110ba81da3a90126f25115fff68
-
Filesize
1KB
MD52aca3ad19a246ee39098713b7468f2cb
SHA1426e1c31b001313e743901cfb2a97fe5587fb006
SHA256a33997fe14154fa41e3c0302df364b4389d4df8976ec34b8aaa0973e27358caf
SHA512c0fa2baab161eabff8f2d94614097fb336016dbd7f955da65c27d86c91b0e67c1424cf78c7be4000cbe26a417e2fd8ad06d0829b20956474e927827106d02ae9