Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
97da975cf879ff9210ee322317dc6f66_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
97da975cf879ff9210ee322317dc6f66_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
97da975cf879ff9210ee322317dc6f66
-
SHA1
6c77c4d5ad998f662900f663f4087ddc7179730a
-
SHA256
9fd6fe428a4723bc8b7e93fdec36e2740ec2973c80ac7e4b4ef29ac12f3fe1f1
-
SHA512
3f9a7edf37144094c5bf0ef12e4a00a53a8cca689c4da886a15870c1fd6572c98cfea5a99c22fff4788620acae9cabe604de2d7d2ae6c7dc1f3fbbc7015bdd07
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nf:O9cKrUqZWLAcUX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x0000000002910000-0x0000000002911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2520 slui.exe 2108 SystemPropertiesPerformance.exe 2208 mfpmp.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2520 slui.exe 1196 Process not Found 2108 SystemPropertiesPerformance.exe 1196 Process not Found 2208 mfpmp.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Madzpveq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Excel\\DKd217yB2TH\\SystemPropertiesPerformance.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 rundll32.exe 2356 rundll32.exe 2356 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2592 1196 Process not Found 30 PID 1196 wrote to memory of 2592 1196 Process not Found 30 PID 1196 wrote to memory of 2592 1196 Process not Found 30 PID 1196 wrote to memory of 2520 1196 Process not Found 31 PID 1196 wrote to memory of 2520 1196 Process not Found 31 PID 1196 wrote to memory of 2520 1196 Process not Found 31 PID 1196 wrote to memory of 2544 1196 Process not Found 32 PID 1196 wrote to memory of 2544 1196 Process not Found 32 PID 1196 wrote to memory of 2544 1196 Process not Found 32 PID 1196 wrote to memory of 2108 1196 Process not Found 33 PID 1196 wrote to memory of 2108 1196 Process not Found 33 PID 1196 wrote to memory of 2108 1196 Process not Found 33 PID 1196 wrote to memory of 1988 1196 Process not Found 34 PID 1196 wrote to memory of 1988 1196 Process not Found 34 PID 1196 wrote to memory of 1988 1196 Process not Found 34 PID 1196 wrote to memory of 2208 1196 Process not Found 35 PID 1196 wrote to memory of 2208 1196 Process not Found 35 PID 1196 wrote to memory of 2208 1196 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97da975cf879ff9210ee322317dc6f66_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2592
-
C:\Users\Admin\AppData\Local\JTh\slui.exeC:\Users\Admin\AppData\Local\JTh\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2520
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:2544
-
C:\Users\Admin\AppData\Local\Xnaz\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\Xnaz\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2108
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:1988
-
C:\Users\Admin\AppData\Local\r97JbotX\mfpmp.exeC:\Users\Admin\AppData\Local\r97JbotX\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56fefac39c6ace41f427674ce9abe247d
SHA1bfeace86585bbec017e08e1236729506ceb74de2
SHA2569a8421dca236378dd8b0951ff2631e8ab7e080b7a10efdb6a3ef47b0d9858ec2
SHA5129c2ff1646074ec4a3d9a60a6070702f75becef47d6a217915fccda795bf11aa26b2e759c9e34987c842862ae90b28cc25a6b0278722d11f5e872acf800a49cef
-
Filesize
1.2MB
MD5412d31e69440213444ca32c289b84d2f
SHA1f15fb5a9cdef6053e3d8f99535eaba617f325702
SHA256eec32834a85b73a590a8d0fbf9ffaf704074bb298ed5e15df6cb486aad3f100e
SHA51240f70bdc0f2138481a12a61b258944936b370ff0f14616fe85bf516144ea78b2bd7472f23634b1772a0c621e0ec08f9ee65d272de3113039e53296a219df2fed
-
Filesize
1.2MB
MD5d2b9f872fe656b1bdbd41975f138bf55
SHA1b5c8e1ee75e5098850d7a1e6b01a9b4a50232587
SHA256c53a63095a6d86c48015f75825bab2de3b234d314dbc0006dcf8e0ad5356912e
SHA5127cc1810cfcc42bd529f7261c54c0f8f57cf866c712e60302c00baf2e693414e412768b5c85afbb907452aaa72eb6331bc1e47cd305a77331dc2c783cc8ce05fc
-
Filesize
1KB
MD5c876da4181a8bdcb22c73c907c36929c
SHA125f95d93fec5748fc01927a5dee212f32c176bda
SHA2562fd2f502a6ab5f1720c96a707197b7f90d3043c600100ce4e6d5f90dc87c6e1b
SHA512606d8612505919a9bbd0e09dea68e5dd31e9569e9f5dea45a2cc5779b4cb2aedb42488d78de6b3c0fe3d0d584379466879c1941529a7e6a7b4fd91e1562881a2
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc