Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a20721654c3fced2cf5ecc9bed5fd3a3
-
SHA1
e1bc4896d120d6ebaf569f6c0a1f8f3fe3b2ae2b
-
SHA256
9d825d941408f6e8d7d47ced824b3e78a5346d0bc899f41ea51d53abbe5d5a13
-
SHA512
434b92c682705ea985f15a39d6771865d3449fea6cd6941604dfce800d95285833ba3b0532d088497867032d6e8680288302acbe866229822280dbc00c940211
-
SSDEEP
24576:CuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:K9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
irftp.exeDxpserver.exemsdt.exepid Process 2560 irftp.exe 2900 Dxpserver.exe 744 msdt.exe -
Loads dropped DLL 7 IoCs
Processes:
irftp.exeDxpserver.exemsdt.exepid Process 1192 2560 irftp.exe 1192 2900 Dxpserver.exe 1192 744 msdt.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\uPsBppXEak\\Dxpserver.exe" -
Processes:
Dxpserver.exemsdt.exeirftp.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA irftp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 2172 regsvr32.exe 2172 regsvr32.exe 2172 regsvr32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1192 wrote to memory of 2544 1192 30 PID 1192 wrote to memory of 2544 1192 30 PID 1192 wrote to memory of 2544 1192 30 PID 1192 wrote to memory of 2560 1192 31 PID 1192 wrote to memory of 2560 1192 31 PID 1192 wrote to memory of 2560 1192 31 PID 1192 wrote to memory of 1472 1192 32 PID 1192 wrote to memory of 1472 1192 32 PID 1192 wrote to memory of 1472 1192 32 PID 1192 wrote to memory of 2900 1192 33 PID 1192 wrote to memory of 2900 1192 33 PID 1192 wrote to memory of 2900 1192 33 PID 1192 wrote to memory of 2348 1192 34 PID 1192 wrote to memory of 2348 1192 34 PID 1192 wrote to memory of 2348 1192 34 PID 1192 wrote to memory of 744 1192 35 PID 1192 wrote to memory of 744 1192 35 PID 1192 wrote to memory of 744 1192 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a20721654c3fced2cf5ecc9bed5fd3a3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:2544
-
C:\Users\Admin\AppData\Local\2FAN4EjM\irftp.exeC:\Users\Admin\AppData\Local\2FAN4EjM\irftp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2560
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:1472
-
C:\Users\Admin\AppData\Local\nBJs\Dxpserver.exeC:\Users\Admin\AppData\Local\nBJs\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2900
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2348
-
C:\Users\Admin\AppData\Local\prMGCmTSp\msdt.exeC:\Users\Admin\AppData\Local\prMGCmTSp\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5bfc7d8eff2a790a03aaa190162b1ae74
SHA1fc7b794a575abf148a8ed6bb30229e7c9dbe0bc7
SHA256e10d976b7e09424243454adfb4c5c6f5135e1977a07d74cabe0d9a8b7f0730fe
SHA51283022ce12d55b0c687445a14e8adddd50a781b3acc2dd595fd33541815dc18c10237f92eb4c4c9e0ed34af09770f387a06dcd439bedfb51d8abdf98c37a617c2
-
Filesize
1.2MB
MD56fc0bfe09bbb6e6aa42738c0e5547cb1
SHA1b85df3a184a1681ab25c114f4199ca8afa1ac383
SHA256e5958941de6531893a0a9c49c92bc898e9d9d0e8e4c539b33eba871c85927f4c
SHA5127f458cbcca6744e2aaaeec21539948b418d14b2bb37876be712b318fab1114e983f79e7f95723a477e14e3924d9990405e2b2d66b3d5b9884f580c3d922a6efb
-
Filesize
1KB
MD592467c756671d3ee4961489f0cfd1242
SHA122ba6eca6dc78ba4b045d71a3829261b38c8dc40
SHA256cc89978b59263f914c0bfc0dc4e582355e1c3d9a4a1c4953fe4cbe7220b5acb9
SHA51290971759c349aa063cab0052dbb9ff905c86aba18d967bd8928a4ea08c6144b6a625d602f1837f7b2fd02fc5589747449ed2793ba7f2119872397567efe26e71
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
1.4MB
MD52fb5be405b7947b30ad887e51392f7d6
SHA1679222e3eb99443e43dffc39b585dea577bb9413
SHA2567d6cbd710ba2132a39a46f5934310a939d61e80714addd5afc7578305741758b
SHA512dd7e33298b22edd2c77562c09a21b4d0427e673e907134fbd499afcad06c6870e6fa39c2b8220e6a6796ab2038f12a0bf6d0256d2fa4a7e8624aba0601bc14ef
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746