Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
9cdb43c23cbe72a36e8ace440955fbb8_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
9cdb43c23cbe72a36e8ace440955fbb8_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
9cdb43c23cbe72a36e8ace440955fbb8
-
SHA1
738d4cbc3da26c3dce6efe3f42d960cb6d504ac6
-
SHA256
580717185d7152b8d9b743535f769b840dc8387ed3fc4cf61d411a6733afef1d
-
SHA512
6ff44db456afbc663d751af9984f037dcdf2fb8b70de6141748904508e0f730375b1f6b7903031c617336048187c955efe48a6082f31edfedea6583baf5d430f
-
SSDEEP
24576:2uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:29cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2756 dwm.exe 3064 DevicePairingWizard.exe 1700 DevicePairingWizard.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2756 dwm.exe 1200 Process not Found 3064 DevicePairingWizard.exe 1200 Process not Found 1700 DevicePairingWizard.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\NQHIVQ~1\\DEVICE~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2968 rundll32.exe 2968 rundll32.exe 2968 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2612 1200 Process not Found 31 PID 1200 wrote to memory of 2612 1200 Process not Found 31 PID 1200 wrote to memory of 2612 1200 Process not Found 31 PID 1200 wrote to memory of 2756 1200 Process not Found 32 PID 1200 wrote to memory of 2756 1200 Process not Found 32 PID 1200 wrote to memory of 2756 1200 Process not Found 32 PID 1200 wrote to memory of 2996 1200 Process not Found 33 PID 1200 wrote to memory of 2996 1200 Process not Found 33 PID 1200 wrote to memory of 2996 1200 Process not Found 33 PID 1200 wrote to memory of 3064 1200 Process not Found 34 PID 1200 wrote to memory of 3064 1200 Process not Found 34 PID 1200 wrote to memory of 3064 1200 Process not Found 34 PID 1200 wrote to memory of 1964 1200 Process not Found 35 PID 1200 wrote to memory of 1964 1200 Process not Found 35 PID 1200 wrote to memory of 1964 1200 Process not Found 35 PID 1200 wrote to memory of 1700 1200 Process not Found 36 PID 1200 wrote to memory of 1700 1200 Process not Found 36 PID 1200 wrote to memory of 1700 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cdb43c23cbe72a36e8ace440955fbb8_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2612
-
C:\Users\Admin\AppData\Local\oit\dwm.exeC:\Users\Admin\AppData\Local\oit\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2756
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:2996
-
C:\Users\Admin\AppData\Local\CR0Au\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\CR0Au\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3064
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:1964
-
C:\Users\Admin\AppData\Local\KnNNy\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\KnNNy\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD560a8241d279e4f30f1104df97b0ba755
SHA17b5c22f8d54f11a564b74edc62cecfc7e4d54808
SHA256156b619f014906072716e1c4984e1cc54ffbc14f3e19392e49c16e3be12a3e29
SHA5121b1865f5ce77bd25bb1bc054318c0849c15a003c2bb2b1f4daffe200f2bdb082aca5a3fd731fccd6fe439eeaa090e8fb13030ed2128eee5fe1c8a4eca63099c2
-
Filesize
1.2MB
MD583a6f56a5ce90e180219d4e1e6883102
SHA1bd4343ceace5ef656e89e6b5c4799dbe2657eb9c
SHA256a15ae0c359ebc0e2425d18347947df30e35a4e8e2c843c5a62e0ec6272c55ada
SHA5121e50ab8589296dd343aa46af1ad971ea08853b4dc747ecc240bc8bde33e8c81721c70a708c97a684f7309667e3d59729cf6b24759049519bcee320f3fe79b35a
-
Filesize
1.2MB
MD5bdfecd6b365c6a83b3b134f4738ec168
SHA13316501b7e43758c1220626033551c484d454f76
SHA25682bb8387adbd786730e6efa8aeac8d84d9b6194ae8cbaac516664c9dd412978f
SHA512e762eb4231169fd211cff2d6f200a08ce7b54db579ef41bc1f6ab840406aa17a0ea27273280d8e01f21694149ea26c26cf484b88d95e54a2c887d54df9ef8283
-
Filesize
1KB
MD538a0694ceac228e58d8558b57fa831e8
SHA1bbbc2760c1a4674738a26273c954e1a43b62696c
SHA2568fc1f50d5e41252d516e116bb81dc23c6a51e1cc51f8351b791386f08c6609fb
SHA512bf1c71832f5d047e8c0681f338b893562b51f8f23dab20ce918eed370cab2d8d526b7cf5c72894ee563e4ebf62094e79809be8740ba326c0244fec0a665a8633
-
Filesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851