Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
a2c8e4117fbdd702afa7eaa9f3e4f45b_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
a2c8e4117fbdd702afa7eaa9f3e4f45b_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a2c8e4117fbdd702afa7eaa9f3e4f45b
-
SHA1
8ef8013bd3fba4a9db7c2b003797eb59f3cc05c8
-
SHA256
40545a6526811c53e2e60af1d8df29607162db993879b289bddf2d2dab73e9d7
-
SHA512
20864d7b6ec128bd32994562d15f08b0b599242909c922c2e6eb4498dd6e2cd6292ffced315d9f54b4cd689387b2b6c5a1a14fe9a83fc0e6d28138e16e5db83c
-
SSDEEP
24576:guYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:w9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x0000000002DC0000-0x0000000002DC1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2660 msdt.exe 2304 dpnsvr.exe 2040 psr.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2660 msdt.exe 1196 Process not Found 2304 dpnsvr.exe 1196 Process not Found 2040 psr.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qntpnaypazzlupr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\sZlNvi\\dpnsvr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 rundll32.exe 1968 rundll32.exe 1968 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2624 1196 Process not Found 30 PID 1196 wrote to memory of 2624 1196 Process not Found 30 PID 1196 wrote to memory of 2624 1196 Process not Found 30 PID 1196 wrote to memory of 2660 1196 Process not Found 31 PID 1196 wrote to memory of 2660 1196 Process not Found 31 PID 1196 wrote to memory of 2660 1196 Process not Found 31 PID 1196 wrote to memory of 2456 1196 Process not Found 32 PID 1196 wrote to memory of 2456 1196 Process not Found 32 PID 1196 wrote to memory of 2456 1196 Process not Found 32 PID 1196 wrote to memory of 2304 1196 Process not Found 33 PID 1196 wrote to memory of 2304 1196 Process not Found 33 PID 1196 wrote to memory of 2304 1196 Process not Found 33 PID 1196 wrote to memory of 1636 1196 Process not Found 35 PID 1196 wrote to memory of 1636 1196 Process not Found 35 PID 1196 wrote to memory of 1636 1196 Process not Found 35 PID 1196 wrote to memory of 2040 1196 Process not Found 36 PID 1196 wrote to memory of 2040 1196 Process not Found 36 PID 1196 wrote to memory of 2040 1196 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2c8e4117fbdd702afa7eaa9f3e4f45b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2624
-
C:\Users\Admin\AppData\Local\ESBT5TQ7p\msdt.exeC:\Users\Admin\AppData\Local\ESBT5TQ7p\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2660
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵PID:2456
-
C:\Users\Admin\AppData\Local\6Jf5ymnj\dpnsvr.exeC:\Users\Admin\AppData\Local\6Jf5ymnj\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2304
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:1636
-
C:\Users\Admin\AppData\Local\5FQg\psr.exeC:\Users\Admin\AppData\Local\5FQg\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56f7c2954767f1f588398ee57096d80e1
SHA16ad2df781ad163ea09c3df2136b3561e35427356
SHA2565b449fc148272c50998f35083168a30b39e4c9053e665b52406d2531224f37ab
SHA5126bf659416d1acda37b779ce1fe98a8289f4889ebfb0fe164e6c82cb7eeaff2eb6891a9f831dcaaa9b9022df9a09f41c5bb4593cdb4d6649a75d4d7f5bc891bdf
-
Filesize
1.2MB
MD54b06c86c33cdf68a5b5fd10cd5fd9c50
SHA163005646750f8b384271c0486613b62aa98e64ce
SHA2568052d213ff0d7348fa2186160007b41a393f9e03bcd42a6af7b101e4b83614e5
SHA5121495489fd56f7d57dd6c33c18ff2ae4e2d66438ba6455e1e6803540f54a06da905364d2ed1411854ba35792ac7e33cac0558530ca6126c2f06cc7f60791c5822
-
Filesize
1.2MB
MD5a9a7b0e241868c67a4c7885063925c0c
SHA11831cfce2f13109e811ff4c08fd5f44d3046d25f
SHA25672e2baef6705e2676dbdd925ac5eab5eade58418993927ba2c140ac6de7afd8d
SHA512c663ba8cf0710ff8cb1115be1aba982e8d97c7bc0a7a15439addb8e3a5ff89ac19e6184b405ab5933220c0d38bc7544d4ed2a7c27f004172c6e02ad299eddf53
-
Filesize
914B
MD5784c958f706b3c093b81e957f5d1fab1
SHA1d42ab2ff568782ab30ccd6addf61a1ac151e81b9
SHA2566d15172e3da6cd24666aeb3968b58fbf4d5872e5c358e7052243ff1bbd861f35
SHA51273bb598457f13f86c0a06969f0b1178ad759d8ad6bc5192ead342e7cbc8c32520656e8159e64a2cd77567631490e150eee0aca0acc5459dba17990e92103f6d3
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746