Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
b1354a3e5555a634bafbb1f7d544a307_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
b1354a3e5555a634bafbb1f7d544a307_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b1354a3e5555a634bafbb1f7d544a307
-
SHA1
8b31570d013db1d63bfdbac53acb3359193fa565
-
SHA256
3b9b60dc1df3c32236efbfa255e992f1dab96551ffa4dfc533a00b6cf810d0ae
-
SHA512
73ae2f978f9cd855f41591d369ff7f606ab84a197322f85de8bb3ad177fbfe58daf3e9037004304ee9f151a382cbc00e9a7c4dcffe344f9d2e1875301fa24e0c
-
SSDEEP
24576:XuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:Z9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-5-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
isoburn.exemsinfo32.exeUI0Detect.exepid Process 316 isoburn.exe 2772 msinfo32.exe 2148 UI0Detect.exe -
Loads dropped DLL 7 IoCs
Processes:
isoburn.exemsinfo32.exeUI0Detect.exepid Process 1184 316 isoburn.exe 1184 2772 msinfo32.exe 1184 2148 UI0Detect.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\Collab\\d0cFmb\\msinfo32.exe" -
Processes:
rundll32.exeisoburn.exemsinfo32.exeUI0Detect.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1184 wrote to memory of 2112 1184 28 PID 1184 wrote to memory of 2112 1184 28 PID 1184 wrote to memory of 2112 1184 28 PID 1184 wrote to memory of 316 1184 29 PID 1184 wrote to memory of 316 1184 29 PID 1184 wrote to memory of 316 1184 29 PID 1184 wrote to memory of 2508 1184 32 PID 1184 wrote to memory of 2508 1184 32 PID 1184 wrote to memory of 2508 1184 32 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2956 1184 34 PID 1184 wrote to memory of 2956 1184 34 PID 1184 wrote to memory of 2956 1184 34 PID 1184 wrote to memory of 2148 1184 35 PID 1184 wrote to memory of 2148 1184 35 PID 1184 wrote to memory of 2148 1184 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1354a3e5555a634bafbb1f7d544a307_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:2112
-
C:\Users\Admin\AppData\Local\v97rqVUgD\isoburn.exeC:\Users\Admin\AppData\Local\v97rqVUgD\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:316
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:2508
-
C:\Users\Admin\AppData\Local\5Xy9\msinfo32.exeC:\Users\Admin\AppData\Local\5Xy9\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2772
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\czt7Bi7p\UI0Detect.exeC:\Users\Admin\AppData\Local\czt7Bi7p\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f8ef710643d909d44971c9fbd16688a3
SHA1b633e3d6296ee064312de9b7af881a9e1070b205
SHA2560d5b9ca821e867d2498dc84bdc6c89f734198d0df2db4c95678bebba4eabcca2
SHA512b7b152bbffa7edaf956f6b8301c2a8598f96318a2bd30a532209ca9ef69f669e34797b84ca8ed35b204c5fd37013c131c5de2fde449669d27dfdf2853c8ab0f9
-
Filesize
1.2MB
MD5c463d550053910f0cb0a6dbf2c786cde
SHA1f0b3c0cb25ead61137661538190d9b8a8688be5c
SHA256b60d876f60b41596d8c94d5abae7dda4f7302ae368701107f4411579f259f673
SHA512dd7a21f7ff12d28a04bf15b4fe1a3391457918c1a101ef1ae54afecb97f996632cf5484786e627303e0bd7d32f7398803202d47f4840b3ba8abac3bf26e7c429
-
Filesize
1.2MB
MD5f04711b0efe114a3b39ab459d2b95995
SHA163f19401a981696c025ea529600c4c61a4fe3c79
SHA2561f6423f43b432a1bd9d6cded6bfd784e85cee156fe1615b93e561eff1a9817bd
SHA512562e6b16891e2be9f33b19ad96c7b5ec82353fb2fdde45a682064af61e011598bacb069e0fd6ea3d2498b818f2190fc1b66e9372831b1b5ee78a61379e25814c
-
Filesize
1KB
MD58cae6f276af4c4ad00bf95a338b2c975
SHA1cd7338d65100421e6f431cb27ee69e021bdee542
SHA2560fa83105091837bcc66f39c988ddda59322f60a3158b4d0a7b8d8faac00106d7
SHA51295f7567eeee4651f337cf54e206ed41ff2a58529e72a0e6e58f25ce77f0658337703c107bbe05292e5f6073876c0ea9a20cf11d71c7fdfa94e9be4a8ae8b8d36
-
Filesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa