Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
a30b4899908225a2b29ef1b14acef84a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
a30b4899908225a2b29ef1b14acef84a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a30b4899908225a2b29ef1b14acef84a
-
SHA1
c35339f69cb4da6c1c36771a3bd6711f142fdec1
-
SHA256
5b2a5ca7d07b80fd01e348dce440046244cc407a5fdee053c21cf5de1a4e7c4e
-
SHA512
eb177eda0a91949f37c296ed66899a03e7ef9f9ffd90b203486631379ebdd441ce7a936452c3476c6c4bcf3d4842ad51f25d4ba09c783209e5077eb83c37618e
-
SSDEEP
24576:ruYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:19cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1428-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
MpSigStub.exerdpinit.exerrinstaller.exepid Process 2644 MpSigStub.exe 1592 rdpinit.exe 2620 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
MpSigStub.exerdpinit.exerrinstaller.exepid Process 1428 2644 MpSigStub.exe 1428 1592 rdpinit.exe 1428 2620 rrinstaller.exe 1428 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wsagbppvydnjcs = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\RX\\rdpinit.exe" -
Processes:
rundll32.exeMpSigStub.exerdpinit.exerrinstaller.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2584 rundll32.exe 2584 rundll32.exe 2584 rundll32.exe 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1428 wrote to memory of 1264 1428 29 PID 1428 wrote to memory of 1264 1428 29 PID 1428 wrote to memory of 1264 1428 29 PID 1428 wrote to memory of 2644 1428 30 PID 1428 wrote to memory of 2644 1428 30 PID 1428 wrote to memory of 2644 1428 30 PID 1428 wrote to memory of 756 1428 31 PID 1428 wrote to memory of 756 1428 31 PID 1428 wrote to memory of 756 1428 31 PID 1428 wrote to memory of 1592 1428 32 PID 1428 wrote to memory of 1592 1428 32 PID 1428 wrote to memory of 1592 1428 32 PID 1428 wrote to memory of 2160 1428 33 PID 1428 wrote to memory of 2160 1428 33 PID 1428 wrote to memory of 2160 1428 33 PID 1428 wrote to memory of 2620 1428 34 PID 1428 wrote to memory of 2620 1428 34 PID 1428 wrote to memory of 2620 1428 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a30b4899908225a2b29ef1b14acef84a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:1264
-
C:\Users\Admin\AppData\Local\OzpwdwQ\MpSigStub.exeC:\Users\Admin\AppData\Local\OzpwdwQ\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2644
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:756
-
C:\Users\Admin\AppData\Local\cOx\rdpinit.exeC:\Users\Admin\AppData\Local\cOx\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1592
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2160
-
C:\Users\Admin\AppData\Local\zxosGYc\rrinstaller.exeC:\Users\Admin\AppData\Local\zxosGYc\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD52e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542
-
Filesize
1.2MB
MD523d4c59e1b61e1ec34bd4d6f48e39a01
SHA1ba056941d9e3c998f0a998028c7d59f84fdac1be
SHA256d6ee43222bd7eaaec260c2053229112176e915d9f9a53e477636f5e65062f1a7
SHA5127aa81be54f413306b814a7cb74dc1acb99ad63dbd454d028bfcb8cb8dcb0c8c66d58668d04c5aa1336ac5ca6964f270633053286944aea8454bcb19c8edff7b1
-
Filesize
1.2MB
MD58e3f1cef46a56fa8de40cd74311d3107
SHA179f9e83ac63a36fbf84b3a2118db78376958bcd2
SHA2569680cac72e9df9652ab094657003045162c9da414955b94696815594cc4b76b2
SHA512f648c3f095c13b58cd9d380a304d5cd6b16cefa443096e9d90c97abbbd6eee588dd223837f478516d1ea9c0d5d537df4a805ba90fb5bd187b33991201bf65948
-
Filesize
1.2MB
MD57f9136b2002154c7cff8802af28dd43d
SHA1d98d39db41f94f89ed1d391c67fb68e843adb741
SHA256424f5ebfad014182bd9fa55d33e3a931e7683fbfc8481bb40f7cd23cf61b5346
SHA512abf2019dc503f420dda607ec39a6156ce5bb2122b54d1a8713dd87fb1c838b9ea66e841582f9d29db66aa24fba45f5e010a53ec40ce192237f96b76146493e68
-
Filesize
943B
MD5ce73ea3ef7ea72dd119ae88efdc0011a
SHA1a70e81c2729a271c0efbea1c1dde7936b4673cad
SHA2568af7b25e7446ef95120c363f8e64d36cecc669ee604b8b97b83d2db966f70807
SHA512f10f0ba19a70c8e3d64263975ea30384de0467ead9283558eea5e32b7dd904abbe1e2bf4ca536eda5e536b0855fdc5e12dd61d5d3f9b69544c7719c7d692472b
-
Filesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4