Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
8f968de65b229b07429e091da4f33aa3
-
SHA1
1be38b944d34c04a4a16a28634facd8cc3e2111f
-
SHA256
3dff0c924f277d23a655e417ad8ac99c91a0acb1c8cd28ace46edc1811051696
-
SHA512
4c22f146a252308da05553ceb86384437fe1836c3c86bd1c0f8bfc5c5bdf60ee8549cd831b9088a4a6e4aa382144766816b718acf5804f83a1130d274f46f1e5
-
SSDEEP
24576:DuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Ny:t9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1216-5-0x00000000024D0000-0x00000000024D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2804 FXSCOVER.exe 2296 msdt.exe 604 spinstall.exe -
Loads dropped DLL 7 IoCs
pid Process 1216 Process not Found 2804 FXSCOVER.exe 1216 Process not Found 2296 msdt.exe 1216 Process not Found 604 spinstall.exe 1216 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lnxdhmhg = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\5fzdd5Si\\msdt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 regsvr32.exe 1484 regsvr32.exe 1484 regsvr32.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2604 1216 Process not Found 31 PID 1216 wrote to memory of 2604 1216 Process not Found 31 PID 1216 wrote to memory of 2604 1216 Process not Found 31 PID 1216 wrote to memory of 2804 1216 Process not Found 32 PID 1216 wrote to memory of 2804 1216 Process not Found 32 PID 1216 wrote to memory of 2804 1216 Process not Found 32 PID 1216 wrote to memory of 2116 1216 Process not Found 33 PID 1216 wrote to memory of 2116 1216 Process not Found 33 PID 1216 wrote to memory of 2116 1216 Process not Found 33 PID 1216 wrote to memory of 2296 1216 Process not Found 34 PID 1216 wrote to memory of 2296 1216 Process not Found 34 PID 1216 wrote to memory of 2296 1216 Process not Found 34 PID 1216 wrote to memory of 1108 1216 Process not Found 35 PID 1216 wrote to memory of 1108 1216 Process not Found 35 PID 1216 wrote to memory of 1108 1216 Process not Found 35 PID 1216 wrote to memory of 604 1216 Process not Found 36 PID 1216 wrote to memory of 604 1216 Process not Found 36 PID 1216 wrote to memory of 604 1216 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8f968de65b229b07429e091da4f33aa3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\C9bYBG\FXSCOVER.exeC:\Users\Admin\AppData\Local\C9bYBG\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2804
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2116
-
C:\Users\Admin\AppData\Local\9xBMLq\msdt.exeC:\Users\Admin\AppData\Local\9xBMLq\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2296
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:1108
-
C:\Users\Admin\AppData\Local\A6fGJzi\spinstall.exeC:\Users\Admin\AppData\Local\A6fGJzi\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51a84b9afc80b7833401a934be42223dd
SHA19f8d671debe6d02874c6898d1c026ef8af0ab7c8
SHA256de2dd7b1d691fc2fdd1a21df6a2c717e05698c64a07aec73133f99ff863030f7
SHA512c448e65eecf665e9a6029663425e3c54a0be54f0fd3dc2451fa0af61f824ce310e3484d993c3deed8908408253aada8d17678569d5337bc4e2ef5f89f12d8311
-
Filesize
1.2MB
MD53fef6d9c33164bcba5f442bf19bfa013
SHA163a7877b3bd47b250e9fb2210ff8e3db7060cc76
SHA25633065f4e49512d1c521c8d85c9c5aecb4b3509d9cf78e034c693c9088277da72
SHA5120f2936e55112d6872b7a2d40b07d8b4997ffaf42245b3b5984e920c47ae79f5cdf99f4d9c2d3b2b33e53e290ae88e4811d8237b84896871e9a3357703cef2fc9
-
Filesize
1.2MB
MD53a8a82903c035a88ee1655017f0aa58a
SHA12ddd130f61b98f4c26682d4cdfef1b09874058b0
SHA256cd38db28e8f3d00d6ea7fd5e722cf36a7c43377fb1c8e8e33d0f3220aacba5d6
SHA512af58c7c00ab838b235bc6bf2bc349f914699b5530f25925e5145cf87a5dac0acb43c98b31fa6c1ec646726a5a2dfeddd5b742b488742989acfc1b21037d5574b
-
Filesize
1KB
MD5433404a6b5952b9fc55db28e8ac04c5e
SHA19966d24501c400d58d7f58a5b6b4bedb8a59b6dc
SHA2565e79ccdd1db0a2a1efa462d8b6fc823b6c55bbd2f4acf7deb5135c80394e2114
SHA512667dc00f99d987a67d281e14da31884c5905aaf69c67921e325e1cd599197eceb723c8fd7b8ec1a649c4cfe81572591f0690a8887586292aa163002dbf33630a
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b