Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
8e19a8bb88b3a6f49c0280001d3d9048_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
8e19a8bb88b3a6f49c0280001d3d9048_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
8e19a8bb88b3a6f49c0280001d3d9048
-
SHA1
c50c2ba966058ea5951583dbccd7b89fbeefad55
-
SHA256
568409d2fe2b02aff5e1b17110ae744f95d9ec7a4f4f977026585845e2b428db
-
SHA512
dbf21ae29251ca3aad7f084485f6f2362b03dc4cdbccc5f3d0566c37bb949537202638c57476f83b98f913fd60754e14dad052059835907ca177e41f3317d56a
-
SSDEEP
24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:m9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x00000000021F0000-0x00000000021F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msinfo32.exewscript.exeirftp.exepid Process 2552 msinfo32.exe 2256 wscript.exe 2800 irftp.exe -
Loads dropped DLL 8 IoCs
Processes:
msinfo32.exewscript.exeirftp.exepid Process 1200 2552 msinfo32.exe 1200 1200 2256 wscript.exe 1200 2800 irftp.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qntpnaypazzlupr = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\ctia\\wscript.exe" -
Processes:
msinfo32.exewscript.exeirftp.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA irftp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 2112 regsvr32.exe 2112 regsvr32.exe 2112 regsvr32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2732 1200 30 PID 1200 wrote to memory of 2732 1200 30 PID 1200 wrote to memory of 2732 1200 30 PID 1200 wrote to memory of 2552 1200 31 PID 1200 wrote to memory of 2552 1200 31 PID 1200 wrote to memory of 2552 1200 31 PID 1200 wrote to memory of 2944 1200 32 PID 1200 wrote to memory of 2944 1200 32 PID 1200 wrote to memory of 2944 1200 32 PID 1200 wrote to memory of 2256 1200 33 PID 1200 wrote to memory of 2256 1200 33 PID 1200 wrote to memory of 2256 1200 33 PID 1200 wrote to memory of 2264 1200 34 PID 1200 wrote to memory of 2264 1200 34 PID 1200 wrote to memory of 2264 1200 34 PID 1200 wrote to memory of 2800 1200 35 PID 1200 wrote to memory of 2800 1200 35 PID 1200 wrote to memory of 2800 1200 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8e19a8bb88b3a6f49c0280001d3d9048_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:2732
-
C:\Users\Admin\AppData\Local\td2oZS9h\msinfo32.exeC:\Users\Admin\AppData\Local\td2oZS9h\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2944
-
C:\Users\Admin\AppData\Local\gryQY9\wscript.exeC:\Users\Admin\AppData\Local\gryQY9\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2256
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:2264
-
C:\Users\Admin\AppData\Local\4rdh2\irftp.exeC:\Users\Admin\AppData\Local\4rdh2\irftp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5021e3f56f34cf8d1b1943c5e8caa8177
SHA1c88f32451233fe2a15d4e98828b5d5714a552dc2
SHA256b255c47c1de1c29f9ee2a47481ff159e01b232a85e24df948492b4dbb0c3a585
SHA5121b13aae6531a443c1c7559ca0eb1ce6ab32554ffe924ef5ad7bb4e2c4ee01462b7fb3c7a6373363e3d9ed8babed4a5877c0b61326803d660e744c27ee83705d9
-
Filesize
1.2MB
MD569811becc8c14de49e69471e1cfa4cac
SHA144b6852f1455c69c9928d19fd264eebca1bd0850
SHA25633393ce9a4ad2f0a138f6f711c07741651480dcaf8970852c17e3af810e32422
SHA5125450e6e4266e024427ad28cf095131ae55342e80a2e9ce076b6540495d12b507975d8a4459b6ad5a6a42a7dcfd85b4b703f6f161498f117e5d3157b4cb06fa25
-
Filesize
1.2MB
MD538c52d0bf6ff41bd98f4241b93ad12fa
SHA1ded8316d2b3befb130c3d7a5a8735789caec5696
SHA2560b4357344ecc98427f42a3cc3b6d43393226651ab6d1131809d2486c9e89e140
SHA512336853f6fbea349816ee9a98d69d559938308189d8b592825e5e16a848a8c2393ff3553b5f33b3363ea550f0a5f17f553e84ec237a0b30b060ed85720d5c8a54
-
Filesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b
-
Filesize
1015B
MD5201b2f5cb292b6b3d3dd156fddb00727
SHA126c431014bd0e9d28fa40d3d3fcaab7380a518a8
SHA25624b40be6b00f65a845ea61c7b44ece8ad887593584da58a94f110bd73a7d617c
SHA512ba9a6ccf3d98d08f3eb57a0ed69d3f3b17f4cb97c105f1efd81ff4bd1b6aec4beed0ae0ff9033fc35efbdebb695d202efafd45e62de24a5037f5eb3f4ad3a6f2
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec
-
Filesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837