Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
9451d3c0720234ff8d9c569a4aad8091_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
9451d3c0720234ff8d9c569a4aad8091_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
9451d3c0720234ff8d9c569a4aad8091
-
SHA1
93bbf76f507f8cb828ce56565b2c49f24cdc833e
-
SHA256
563a650a72c772c648f6b34055b1d31c379fa7beef40d6eba02aa25b5a7316d2
-
SHA512
21682d7762390f1504933c3e1a978d806a2334f43f5ac6d6d2c575bbfd950c1dc8eb8b4cd4216a893f23b3cc814cbe48e6e493c5da6cb998960a19edce17f88d
-
SSDEEP
24576:quYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:y9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002E20000-0x0000000002E21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
xpsrchvw.exetcmsetup.exewermgr.exedvdupgrd.exepid Process 264 xpsrchvw.exe 2856 tcmsetup.exe 3040 wermgr.exe 2860 dvdupgrd.exe -
Loads dropped DLL 8 IoCs
Processes:
xpsrchvw.exetcmsetup.exedvdupgrd.exepid Process 1200 264 xpsrchvw.exe 1200 2856 tcmsetup.exe 1200 1200 2860 dvdupgrd.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qntpnaypazzlupr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\PrivacIE\\FLHvpiIDBx\\tcmsetup.exe" -
Processes:
tcmsetup.exedvdupgrd.exerundll32.exexpsrchvw.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2360 1200 30 PID 1200 wrote to memory of 2360 1200 30 PID 1200 wrote to memory of 2360 1200 30 PID 1200 wrote to memory of 264 1200 31 PID 1200 wrote to memory of 264 1200 31 PID 1200 wrote to memory of 264 1200 31 PID 1200 wrote to memory of 2516 1200 32 PID 1200 wrote to memory of 2516 1200 32 PID 1200 wrote to memory of 2516 1200 32 PID 1200 wrote to memory of 2856 1200 33 PID 1200 wrote to memory of 2856 1200 33 PID 1200 wrote to memory of 2856 1200 33 PID 1200 wrote to memory of 3036 1200 34 PID 1200 wrote to memory of 3036 1200 34 PID 1200 wrote to memory of 3036 1200 34 PID 1200 wrote to memory of 3040 1200 35 PID 1200 wrote to memory of 3040 1200 35 PID 1200 wrote to memory of 3040 1200 35 PID 1200 wrote to memory of 2896 1200 36 PID 1200 wrote to memory of 2896 1200 36 PID 1200 wrote to memory of 2896 1200 36 PID 1200 wrote to memory of 2860 1200 37 PID 1200 wrote to memory of 2860 1200 37 PID 1200 wrote to memory of 2860 1200 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9451d3c0720234ff8d9c569a4aad8091_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:2360
-
C:\Users\Admin\AppData\Local\WHEp\xpsrchvw.exeC:\Users\Admin\AppData\Local\WHEp\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:264
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:2516
-
C:\Users\Admin\AppData\Local\Tug\tcmsetup.exeC:\Users\Admin\AppData\Local\Tug\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2856
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:3036
-
C:\Users\Admin\AppData\Local\ux7\wermgr.exeC:\Users\Admin\AppData\Local\ux7\wermgr.exe1⤵
- Executes dropped EXE
PID:3040
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2896
-
C:\Users\Admin\AppData\Local\fPr3\dvdupgrd.exeC:\Users\Admin\AppData\Local\fPr3\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fd1a7bd6cb592731b2a72a3c13b5a64b
SHA11e9a3a1757866e49d39dfdd615b14e7f4bef720e
SHA2565eaa79f0c49ab526dab5815a382fdf33e40b269b3a3934e1eb537c0aa0b28058
SHA5120612019dff80d30a696c40c91c7d245543f1c49c8b96b3a8ec002179b2f5c608194055850788033fd76c612149360317448f3e5b3e66c475840f9c0fc40519e3
-
Filesize
1.2MB
MD5bfce1946da72a87c75a4110cdc31ff9d
SHA1086917f11c0e649f6d4181f72f976d1eec327529
SHA25690f8e467f47a70a717a6760a3a6521d7786a20ca317770327f264f9249005254
SHA512cce4adaf2eb0caeff8b219a115cbe37cc42a020d08c3b60dc7b6043474ea6617d70d5472ef4aaa8c67a72aa2b3a1ccdc9d1e08fd1a6f23fb4f9c0049ff176f36
-
Filesize
1.2MB
MD595a7a506fa779ba6c33c9a96c7daeb3c
SHA13465cef5d5a9a3ba2e61b58d650afdb3645217c8
SHA256f8abb3877570a77e57ae47aec3c927c669ee6b2dc2bedbdee5bf1f52d61aac81
SHA5122a2860fa4daec27ac17e2cb94a4618a048c894d3f76dd047b92d2b4a7a8a0806cec12ba66171c20829103f3619fc1bd2a4a8d9de56629e14c92bdb76febcb1c5
-
Filesize
1KB
MD5b9a5597f45ac2d398e5cc03dec34ea58
SHA155c6fa243a1dbcbda44683a2c4a997cffa0626a2
SHA2564161318a3fb6dbbf38453c11decfd2f1ccb9826d85bd41f96e199943dc1d0b45
SHA512352dee0eb2b9bdb8a0d882bce38d2db59464a2c169d7d31305eb949789d6e83d5b0c124edaa41fc4e286a74846568675ff93effb1d8333df0e71145c0285a59a
-
Filesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
Filesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
Filesize
49KB
MD541df7355a5a907e2c1d7804ec028965d
SHA1453263d230c6317eb4a2eb3aceeec1bbcf5e153d
SHA256207bfec939e7c017c4704ba76172ee2c954f485ba593bc1bc8c7666e78251861
SHA51259c9d69d3942543af4f387137226516adec1a4304bd5696c6c1d338f9e5f40d136450907351cce018563df1358e06a792005167f5c08c689df32d809c4cebdcf