Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
919faabaf40217b576a1f93cab032587_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
919faabaf40217b576a1f93cab032587_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
919faabaf40217b576a1f93cab032587
-
SHA1
846b9da7874bf67d4ac2c506113852d2d65b363d
-
SHA256
c1c7e9180c08d543ddb651df2858b8d84fe6964012ba3cba206d3d025db49e36
-
SHA512
724addbbc986ecb110c698cdd916c8ef00d6e28d509533d10793c21476fa39c0e371ca7032a9a0cf4a5bdc80728e1221377c84b09d7a577551dadeda30b409b5
-
SSDEEP
24576:KuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:S9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002D50000-0x0000000002D51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2624 BdeUISrv.exe 2476 spinstall.exe 1924 winlogon.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2624 BdeUISrv.exe 1200 Process not Found 2476 spinstall.exe 1200 Process not Found 1924 winlogon.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wsagbppvydnjcs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-2257386474-3982792636-3902186748-1000\\DLCdv\\spinstall.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 regsvr32.exe 1476 regsvr32.exe 1476 regsvr32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2608 1200 Process not Found 30 PID 1200 wrote to memory of 2608 1200 Process not Found 30 PID 1200 wrote to memory of 2608 1200 Process not Found 30 PID 1200 wrote to memory of 2624 1200 Process not Found 31 PID 1200 wrote to memory of 2624 1200 Process not Found 31 PID 1200 wrote to memory of 2624 1200 Process not Found 31 PID 1200 wrote to memory of 1912 1200 Process not Found 32 PID 1200 wrote to memory of 1912 1200 Process not Found 32 PID 1200 wrote to memory of 1912 1200 Process not Found 32 PID 1200 wrote to memory of 2476 1200 Process not Found 33 PID 1200 wrote to memory of 2476 1200 Process not Found 33 PID 1200 wrote to memory of 2476 1200 Process not Found 33 PID 1200 wrote to memory of 2424 1200 Process not Found 34 PID 1200 wrote to memory of 2424 1200 Process not Found 34 PID 1200 wrote to memory of 2424 1200 Process not Found 34 PID 1200 wrote to memory of 1924 1200 Process not Found 35 PID 1200 wrote to memory of 1924 1200 Process not Found 35 PID 1200 wrote to memory of 1924 1200 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\919faabaf40217b576a1f93cab032587_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2608
-
C:\Users\Admin\AppData\Local\YM25\BdeUISrv.exeC:\Users\Admin\AppData\Local\YM25\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2624
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:1912
-
C:\Users\Admin\AppData\Local\DaE\spinstall.exeC:\Users\Admin\AppData\Local\DaE\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2476
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:2424
-
C:\Users\Admin\AppData\Local\PAQWPgYVZ\winlogon.exeC:\Users\Admin\AppData\Local\PAQWPgYVZ\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD579ba7e5a8b04d22f856ace0a27ede877
SHA151f761c582586aebc2776b23f3e6a0cabd8f81ce
SHA25621c49b16a62b45f6e068c8a72e72231cfea93a320b9708b2b63d2c23cec525bb
SHA5128b39eeb53c6ab312fe8c35da039075e6e80ffc8d0c68cd2407cf4c259b4350dec871f0a52341ea24740247e7fdfb7496f196e3646b0f054dd40b7771e6fe21f6
-
Filesize
1.2MB
MD5e88bb8dd806319ff85b279534505674c
SHA10ba7033e0e47f211b7fd112d6905deeccd0586e4
SHA2566dd334f998e8d3c1656c7c24eb24eef5032784ccf8ed062a02cfb7fabcb4a433
SHA512ef3b35e265a0c1801c3590e662f8d4f4f204744e226e3a99c4963868e00ec730cc38de3b79ba3b3fbfb8093d689e452fd333b60a61734e0b510f138221b3c88b
-
Filesize
1.2MB
MD510bc298b7fa3654d5d52170a2e44c4e7
SHA1d92dbf10200aa81661c462646794dc32040c7c0e
SHA256ea89bf0cfb88a68620c38f77c3629a314447cb4fe69ea59df020027e0f0680ec
SHA5126c29a2c7d51acb780e6062d04c4898d29d9896ec4e3bfb37221c30cfb47e26b0a6f3a7567245cc5688fb233c241f833b79992af67301d9aa28138a1cf555b9ea
-
Filesize
1KB
MD5a05db5898bf9125efd7df00508e52905
SHA13e0459b86f1335e25f294204991f4405258dbe26
SHA256e68330a55ccc216519499fb63c235d22f4b0ce8edf01d979155af4d441e04670
SHA51281bd97a26eec8b9f424cb24463ef5b9916b7d5a74edb79fe8eb5fa9e2ec8ef30e09f18704c8f0c7465c1dcf9e7a188e2fd158682a3ae053bf6541243c144f056
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6