Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b612fd6158326f6573d2c195218b4187
-
SHA1
8a784d8434dc4ee8a185038e55beeae77169be6e
-
SHA256
0a5a9a825cdb713862e4db1eeea33b8847e231cc54197c9b4b7b958c70e9c253
-
SHA512
41fa451ca8ff1d805fa5407174fa0e59a6468017a91a3f2b2a0db6b84cbd26573bbce4788ead48c3fc41e40313886c2ef2237a6e99a9f41b710cf344ba1cb47a
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000002E30000-0x0000000002E31000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WindowsAnytimeUpgradeResults.exespinstall.exeRDVGHelper.exepid Process 2176 WindowsAnytimeUpgradeResults.exe 600 spinstall.exe 2984 RDVGHelper.exe -
Loads dropped DLL 7 IoCs
Processes:
WindowsAnytimeUpgradeResults.exespinstall.exeRDVGHelper.exepid Process 1196 2176 WindowsAnytimeUpgradeResults.exe 1196 600 spinstall.exe 1196 2984 RDVGHelper.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tlngny = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\KbA\\spinstall.exe" -
Processes:
rundll32.exeWindowsAnytimeUpgradeResults.exespinstall.exeRDVGHelper.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1196 wrote to memory of 2680 1196 30 PID 1196 wrote to memory of 2680 1196 30 PID 1196 wrote to memory of 2680 1196 30 PID 1196 wrote to memory of 2176 1196 31 PID 1196 wrote to memory of 2176 1196 31 PID 1196 wrote to memory of 2176 1196 31 PID 1196 wrote to memory of 2104 1196 33 PID 1196 wrote to memory of 2104 1196 33 PID 1196 wrote to memory of 2104 1196 33 PID 1196 wrote to memory of 600 1196 34 PID 1196 wrote to memory of 600 1196 34 PID 1196 wrote to memory of 600 1196 34 PID 1196 wrote to memory of 2708 1196 35 PID 1196 wrote to memory of 2708 1196 35 PID 1196 wrote to memory of 2708 1196 35 PID 1196 wrote to memory of 2984 1196 36 PID 1196 wrote to memory of 2984 1196 36 PID 1196 wrote to memory of 2984 1196 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b612fd6158326f6573d2c195218b4187_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:2680
-
C:\Users\Admin\AppData\Local\MyjCk\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\MyjCk\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2176
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:2104
-
C:\Users\Admin\AppData\Local\9sHjR\spinstall.exeC:\Users\Admin\AppData\Local\9sHjR\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:600
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\3c29FQgk\RDVGHelper.exeC:\Users\Admin\AppData\Local\3c29FQgk\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD530f512ff4c3dc43d8a90e7ba31d138e9
SHA155e8785a9443bc1c78499ae37600e7b43bd56a02
SHA256b7c0f6e81cea7b9be8c7aec65821e361131c79902dd3bf2e3c49eb2b4dcde301
SHA51209fabfa4e238ac76a1dc33078cd3ffa16e8d0ec0b02f1985ac2e3954f7b5d6d5c73df6e813adcb1db3588505de485c33156c3f82a377b76715e904630ef81ddb
-
Filesize
1.2MB
MD556fcaadcc3dc82cfcba9fb5eec330cf1
SHA16e6af638ad6a91a76c0227c159b889ebc1fa6982
SHA256fc8f952a03a44ec4d5fab1a6488e73bba3150b679b7738440e06f45df475669e
SHA51271d00b5307f9db39bb2408dc84ce43cf76b0ee381819faba7f033dcfcdc102b24ed0aca8728073432a08ff79492cf3e1288f3c875d2e4335c21cbd4af49f08d3
-
Filesize
1.2MB
MD595fb7f7b7c9f37ae3fb512c3a254753d
SHA1322c3e58d06a3f200d70ba1bf34f40be02ec9be4
SHA2560e4aa4880db53c67f0fef008de0762a69933b347b4697de990245345a1e85b25
SHA512616bd6583ca721472c77045ae7dc4281ce999aa700ee5812a1581dc73b2b7f72a07b5297c2dcdd8467f9d90d24d9ff00b8dbd2fcb13e3c34df6f5d2909ee562a
-
Filesize
1KB
MD570f0bffa0a65bb31dd9a4b12394da09a
SHA10d592f9116c2fb910606c9147ec0fd64eef1e13c
SHA256bef323ecc5295547629fba74c963106bf2f7b9cd6fd4d94bbaf60797eeeda2ca
SHA512922fdb6e6f1b5b0d03bd7f215268f42b3537b39d1c7b57265c56f6107d50a9ec8d11b28cada9f6649da6381f3e200f3b8a605e9868b6e2f2d9f89f48e57db670
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e