Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
afb00d38603a12de72531ad560e85254_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
afb00d38603a12de72531ad560e85254_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
afb00d38603a12de72531ad560e85254
-
SHA1
f7b662d6bfbf3821b03f572deec18a07b7e8f175
-
SHA256
c51312f6ea110b81ae4ddec3ee994b9cd14b800568ab4e0e99a903f4c77fb9aa
-
SHA512
b6993eff1aa74e7b4f03882b20759469eb807511f4c9d02fdc939a44b1ff04b7217dd80037a8caa205c9d784cad6d840a5867026f84bbd3390ad63cc12b903d2
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000002660000-0x0000000002661000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Dxpserver.exejavaws.exemsconfig.exepid Process 2620 Dxpserver.exe 2516 javaws.exe 1716 msconfig.exe -
Loads dropped DLL 7 IoCs
Processes:
Dxpserver.exejavaws.exemsconfig.exepid Process 1204 2620 Dxpserver.exe 1204 2516 javaws.exe 1204 1716 msconfig.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tlngny = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\g0Jc\\javaws.exe" -
Processes:
rundll32.exeDxpserver.exejavaws.exemsconfig.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2408 rundll32.exe 2408 rundll32.exe 2408 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1204 wrote to memory of 2184 1204 30 PID 1204 wrote to memory of 2184 1204 30 PID 1204 wrote to memory of 2184 1204 30 PID 1204 wrote to memory of 2620 1204 31 PID 1204 wrote to memory of 2620 1204 31 PID 1204 wrote to memory of 2620 1204 31 PID 1204 wrote to memory of 2500 1204 32 PID 1204 wrote to memory of 2500 1204 32 PID 1204 wrote to memory of 2500 1204 32 PID 1204 wrote to memory of 2516 1204 33 PID 1204 wrote to memory of 2516 1204 33 PID 1204 wrote to memory of 2516 1204 33 PID 1204 wrote to memory of 1516 1204 34 PID 1204 wrote to memory of 1516 1204 34 PID 1204 wrote to memory of 1516 1204 34 PID 1204 wrote to memory of 1716 1204 35 PID 1204 wrote to memory of 1716 1204 35 PID 1204 wrote to memory of 1716 1204 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\afb00d38603a12de72531ad560e85254_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Local\rthy\Dxpserver.exeC:\Users\Admin\AppData\Local\rthy\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2620
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2500
-
C:\Users\Admin\AppData\Local\K0jro\javaws.exeC:\Users\Admin\AppData\Local\K0jro\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2516
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:1516
-
C:\Users\Admin\AppData\Local\gznKXF\msconfig.exeC:\Users\Admin\AppData\Local\gznKXF\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e5091d839a237e9545d34eaf7d462d51
SHA1c04282973e0883974140ac3ed5fc287415838b2d
SHA256c63ba42e345d8202fb10f33ec07cdbe9547e1b9b37ea4b77b44d5d74ae798266
SHA512a4c7c881db217763b824b48b8d6cdbc04fa0ab68caaa375c287e968ba53c3c4004f02767f00be651b84152bf6511a5a07b8b081150427ccda2d3c3f04f1d12c8
-
Filesize
1.2MB
MD5202e0105273514f6de7a119b88006fc2
SHA1ba633e01bedcdbc8372141e8a31dce89b27331fb
SHA256c7715279d923cc8da4b84016ef863a0f21d64f01f6712ef55b01fe5696cb3bbf
SHA5125588d21fc4797ab9b3a389e119fc3466e1498a3f923131745f889d6e7bcb0391255126c15f535de439904eb1f556f7bbe94c0dd8912417e23852281d05bd99fd
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
1.2MB
MD5afb0ea894372c3e393e5d5cadf2fcac3
SHA16d34830dbe5abfcc35d6cad86476b5ee4703d5c2
SHA2565d031155aedfe7f6d2bc1ce666bf2b9e67f732d2002e75aef50ea18b414511af
SHA512ebfcfb6c6f3441e1684782c26622c4792a538617db870579e03f2c62315ada33c979309be1670001004720c14ad6aa900d838df96a2ac86c60c72c9c3b65e79d
-
Filesize
1KB
MD5bf8f5b5812929bd3d93f25ab7bf76316
SHA19f2adde6b7e9fa3f40ff06efcc7407ab19945ce1
SHA256be122962cbdff4080b9e1e29ca63b654688abed4a7c0f0f6fdc1c8bab5982016
SHA51297383880ec195aa8adafefb4d90ced9e0358add09f17b5ac9a735339b5ac8d12ca889f49825fd9b698fff9f55a66bfe351cf81923bcdfd6a07de56b0cbed8596
-
Filesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283