Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
a0682d74e106b09ade2106ede229c053_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0682d74e106b09ade2106ede229c053_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a0682d74e106b09ade2106ede229c053_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a0682d74e106b09ade2106ede229c053
-
SHA1
9fe391db18b3625649adf27e339e81003318dda6
-
SHA256
0f22dce9cc7521ce92c5b64195b89405390cebe4f68a95852c92e1393d5ab821
-
SHA512
3093e13ab01081095346941f710fda9c9ad53377719880366441a8a28543ca120cf47fa6abae2b863fa30a0076b675e51233cdf7e8d9a6ca463b77afcb9bce31
-
SSDEEP
24576:KuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:S9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x00000000025D0000-0x00000000025D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2484 raserver.exe 2672 msconfig.exe 1484 perfmon.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2484 raserver.exe 1204 Process not Found 2672 msconfig.exe 1204 Process not Found 1484 perfmon.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nvzakw = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\jkiST0\\msconfig.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2432 1204 Process not Found 29 PID 1204 wrote to memory of 2432 1204 Process not Found 29 PID 1204 wrote to memory of 2432 1204 Process not Found 29 PID 1204 wrote to memory of 2484 1204 Process not Found 30 PID 1204 wrote to memory of 2484 1204 Process not Found 30 PID 1204 wrote to memory of 2484 1204 Process not Found 30 PID 1204 wrote to memory of 2400 1204 Process not Found 31 PID 1204 wrote to memory of 2400 1204 Process not Found 31 PID 1204 wrote to memory of 2400 1204 Process not Found 31 PID 1204 wrote to memory of 2672 1204 Process not Found 32 PID 1204 wrote to memory of 2672 1204 Process not Found 32 PID 1204 wrote to memory of 2672 1204 Process not Found 32 PID 1204 wrote to memory of 2292 1204 Process not Found 33 PID 1204 wrote to memory of 2292 1204 Process not Found 33 PID 1204 wrote to memory of 2292 1204 Process not Found 33 PID 1204 wrote to memory of 1484 1204 Process not Found 34 PID 1204 wrote to memory of 1484 1204 Process not Found 34 PID 1204 wrote to memory of 1484 1204 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0682d74e106b09ade2106ede229c053_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:976
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2432
-
C:\Users\Admin\AppData\Local\fXxql\raserver.exeC:\Users\Admin\AppData\Local\fXxql\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2484
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2400
-
C:\Users\Admin\AppData\Local\pT6HUq1\msconfig.exeC:\Users\Admin\AppData\Local\pT6HUq1\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2672
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2292
-
C:\Users\Admin\AppData\Local\7BPz\perfmon.exeC:\Users\Admin\AppData\Local\7BPz\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54f0a87bb3d5624c886e9018010cdfc69
SHA1f06410c53069f5d0f3b32314ef765984b495d158
SHA256de4b67f5b60b0f3833e55c791f496c48a6e8bb256733d19584f92f724374e91e
SHA5122a4b1af764da099a210bf9b68803582ff6eaa1a629953627ad712d0fa7b1a5ff022283488ddb604feb6ce12490bbc1634dedcfb29378f5a4439e541b7d18fc20
-
Filesize
1.2MB
MD59f11656afc1440bd301d17fce9ec6049
SHA127396e0c6f2913f7cf036ee17291b88cdb06aca5
SHA256530f34861d3aef28b8d36a1aaa7e8a12dfc2914ff544aa039c056e4b586e4d1e
SHA512e9c0031b0085bca85809ab71b3d674b120c82c2da1998fa81bb7cfe22acd16419d03de2edb2415af37acfea170949ae16c6a5664bf19fb1ce850d4a716f54195
-
Filesize
1.2MB
MD5e9f1d5c7dc5921321d77ef973e86fa01
SHA16f71889c2a02d324a494d706d84e9d5fff909544
SHA256e45c07b70971743db791c59bc0bf64f02289693d98e34c33ec6897173a4ff2d0
SHA512502054393f94f3cff25424012741b81d66727b20f0d68cc4b38d0c6fadabe1d7044ff068146044c5dac22c93c747af951214238374cf05068ca0beb0a657c4e1
-
Filesize
943B
MD525dfcbb4b99afdb497e8125d6a2faff4
SHA1d934b18c5595db83bf131629de42b928091dd1ec
SHA256135aec97e01b97f54c9f51147ebd3c3b7ba065abfc75b58b46c381ed9fe4bcbc
SHA512d2c46f3a3714c48a50c54af5ec6e801a1e4606855e2099ee5c7f5fba9dd3088d845fee2bccac769624a8a990c03c68bbd9cde88becd35bc0c68ddbf30c90aa21
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283