Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
aabbda269fc690bf1270e2f2a727030f_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
aabbda269fc690bf1270e2f2a727030f_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
aabbda269fc690bf1270e2f2a727030f
-
SHA1
1169a82250440dc8ce225e7f936c47e05b1b858e
-
SHA256
38d90b577fe406506b98dcfa44671fb4623e64a226880bbf52658901e4c9bf0e
-
SHA512
e524f3c97d7492ffadfac9fdb6e5adcf90d9583e8c9262544757fa43902f715656c14c7ae33f1982930e454174dc703bc24bd4a963aa1479de992bb93b39fee8
-
SSDEEP
24576:nuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NGpt:J9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002B00000-0x0000000002B01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
irftp.exeRDVGHelper.exevmicsvc.exepid Process 2600 irftp.exe 1040 RDVGHelper.exe 552 vmicsvc.exe -
Loads dropped DLL 7 IoCs
Processes:
irftp.exeRDVGHelper.exevmicsvc.exepid Process 1200 2600 irftp.exe 1200 1040 RDVGHelper.exe 1200 552 vmicsvc.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wsagbppvydnjcs = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\R3A2ON~1\\RDVGHE~1.EXE" -
Processes:
RDVGHelper.exevmicsvc.exerundll32.exeirftp.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA irftp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2688 rundll32.exe 2688 rundll32.exe 2688 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2648 1200 30 PID 1200 wrote to memory of 2648 1200 30 PID 1200 wrote to memory of 2648 1200 30 PID 1200 wrote to memory of 2600 1200 31 PID 1200 wrote to memory of 2600 1200 31 PID 1200 wrote to memory of 2600 1200 31 PID 1200 wrote to memory of 2540 1200 32 PID 1200 wrote to memory of 2540 1200 32 PID 1200 wrote to memory of 2540 1200 32 PID 1200 wrote to memory of 1040 1200 33 PID 1200 wrote to memory of 1040 1200 33 PID 1200 wrote to memory of 1040 1200 33 PID 1200 wrote to memory of 1748 1200 34 PID 1200 wrote to memory of 1748 1200 34 PID 1200 wrote to memory of 1748 1200 34 PID 1200 wrote to memory of 552 1200 35 PID 1200 wrote to memory of 552 1200 35 PID 1200 wrote to memory of 552 1200 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aabbda269fc690bf1270e2f2a727030f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
C:\Windows\system32\irftp.exeC:\Windows\system32\irftp.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\EH0uft0\irftp.exeC:\Users\Admin\AppData\Local\EH0uft0\irftp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2600
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2540
-
C:\Users\Admin\AppData\Local\FZVTGiO\RDVGHelper.exeC:\Users\Admin\AppData\Local\FZVTGiO\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1040
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:1748
-
C:\Users\Admin\AppData\Local\UTTi5jaar\vmicsvc.exeC:\Users\Admin\AppData\Local\UTTi5jaar\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5094d5f8ea54a2caef10faea078cec357
SHA1a47be4c72138341a2b30c70cd07912755a42343c
SHA2568dcd78e20c2b707970a27fee01e57407b94bd74f179a4d09a203362d5637d602
SHA51267e79117b19cf566da5ca974594406486cfcf6e90c21e077a4c8da4dd6abb7fb53fb58148328fea472ae6e0c7ad0b6d56c28367196a2664b6a8c53dc286e02c2
-
Filesize
1.2MB
MD51d12e3991a09b805617c607bb8ef5c5f
SHA19c7eef1b98a6b0d46d9c48194cc72b86d47850e4
SHA25611ec5da03e140336ad590252beca2b22eef8740c45d3f761ca60259762dd8ed7
SHA5129b888f31dfbd90770d7f9f06c10153d456399d5b0d0dfd5ab8517202bb2a0447bac51a52b38af725fc4c7df3e59060df9ace12bf2478c35bc40d4ce4a060d9f9
-
Filesize
1.2MB
MD54de94599e6e0f45709a510c52fa05b3c
SHA182b1ef7adf1a3b05d7996072bb433b6288634ef8
SHA2568e36840f312944d6cefa4fbc11ec348798eaa8b443b957f9c334e8daf50cfb96
SHA5122b63be17ac852376e93841eb20b17a9894723bc4ad895c54da36362c3d0878ad48b8b1c9196ab1e94aa5cf598496dd35ff6ded8384b310251d37c04684205904
-
Filesize
1KB
MD5f45e011d2e820973746cab6d7ac39999
SHA115a9c56b8fdbb0d0ed1d6f7c6801be6347c8c7e7
SHA256fca883e1bd73cc5b445d7b43b0b487855bdbbde4dc810b61f25e7b028140f28d
SHA5127f2dd79f7f8e4606d62cc3fa5fee24bd6753f04de37951b4769fe8c9a89a11834c55ff9df69349871ef87992d1fbf1457b2adb15d8068a6e1b942fdbc7b07009
-
Filesize
192KB
MD50cae1fb725c56d260bfd6feba7ae9a75
SHA1102ac676a1de3ec3d56401f8efd518c31c8b0b80
SHA256312f4107ff37dc988d99c5f56178708bb74a3906740cff4e337c0dde8f1e151d
SHA512db969064577c4158d6bf925354319766b0d0373ddefb03dbfc9a9d2cadf8ddcd50a7f99b7ddf2ffad5e7fdbb6f02090b5b678bdf792d265054bff3b56ee0b8ec
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988