Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b79de8bd575fd4c340b9fa4352696533
-
SHA1
7e1b2fab1003993cb117cae87b239b42e657a56d
-
SHA256
5f809c22a4793c5f79ce37d5621580998d890837537e420d638ef1681964220d
-
SHA512
1d573f55c41b7315076e602eccc5a5830fc284e63df96863350c19cb21f363703759ab404a324298ee9c4731b9399041814c5d53e194f15bc21c486118cf5d0a
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1392-5-0x0000000002A40000-0x0000000002A41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
psr.exeslui.exelpksetup.exepid Process 1824 psr.exe 2660 slui.exe 2496 lpksetup.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exeslui.exelpksetup.exepid Process 1392 1824 psr.exe 1392 2660 slui.exe 1392 2496 lpksetup.exe 1392 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wsagbppvydnjcs = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\czyW3\\slui.exe" -
Processes:
rundll32.exepsr.exeslui.exelpksetup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 3048 rundll32.exe 3048 rundll32.exe 3048 rundll32.exe 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1392 wrote to memory of 2944 1392 29 PID 1392 wrote to memory of 2944 1392 29 PID 1392 wrote to memory of 2944 1392 29 PID 1392 wrote to memory of 1824 1392 30 PID 1392 wrote to memory of 1824 1392 30 PID 1392 wrote to memory of 1824 1392 30 PID 1392 wrote to memory of 1696 1392 31 PID 1392 wrote to memory of 1696 1392 31 PID 1392 wrote to memory of 1696 1392 31 PID 1392 wrote to memory of 2660 1392 32 PID 1392 wrote to memory of 2660 1392 32 PID 1392 wrote to memory of 2660 1392 32 PID 1392 wrote to memory of 1204 1392 33 PID 1392 wrote to memory of 1204 1392 33 PID 1392 wrote to memory of 1204 1392 33 PID 1392 wrote to memory of 2496 1392 34 PID 1392 wrote to memory of 2496 1392 34 PID 1392 wrote to memory of 2496 1392 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b79de8bd575fd4c340b9fa4352696533_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2944
-
C:\Users\Admin\AppData\Local\ZocUg\psr.exeC:\Users\Admin\AppData\Local\ZocUg\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1824
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:1696
-
C:\Users\Admin\AppData\Local\lIPg5BVxZ\slui.exeC:\Users\Admin\AppData\Local\lIPg5BVxZ\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2660
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵PID:1204
-
C:\Users\Admin\AppData\Local\PXOUBRS5\lpksetup.exeC:\Users\Admin\AppData\Local\PXOUBRS5\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f03bcd741ffb114360bb79b7e6d6c7bc
SHA13a968f402cf96d24a22665bf7d5e82f71714a21b
SHA256428c64e08014e6fbeb733491c22bdef1ef78b54a25cd9f88603b9ef7d723b245
SHA512a2fad6f77b38033d734fb08f012e0190a273498292bfd60513f6b9b5a08c257c8fd5f3604bda0ab704e9851e2e9aa1aeaea4ed7510fe75af1e1be93ade52e893
-
Filesize
1.2MB
MD568e21457077a0dfc2ab879c33f1759fc
SHA158a1c868e7f885a856f7a7ec108ef5d67c7ab115
SHA256d3ae0e51d02f691347ca5e6d5b6bcbb6f9f63f7fa1e37b238d0b5783ed55e9f2
SHA512619a8b50a4e47a9066111ccfe1ec6b71ae0f6ea5275f21806e054abc9d4accc431fc3d9bad2d8be11ceacb4c998e4840a89ef9f76cb4283335093bf4852c122d
-
Filesize
1KB
MD57660bc6def89c2f4037ca48994a887d2
SHA1ad4ebb4e6289b6e8bdaccbb8849cfbc30f75a0ae
SHA2566716fd6cbab145151eaf9fabc1021a742feabc1ce64d7e27dcf60bf41488260f
SHA512354de4354dd82031cd597f87cea6f8c0d9d77718812027102529fa97be479366410f5a705b959521165787fcd91a45fe65f0067d73d18cb2df87c24430699971
-
Filesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
Filesize
1.2MB
MD5bb874ec7daea6881c785887436fa65f8
SHA17e21e31a77b57f4e740914bb72ef8b452d0d73d8
SHA256e7bac47acd4d031f69d29ab2e519280182f00f4a2e5f8d5431bb83f867fa97a3
SHA512ac841067321f59aeed5ddd9c5641feb097d26a4d8aabb939ccc39b3393e66f3d36cb56ab378b90df0f1b05f788e31861a8a759d08ddec1c692ea0091b3457242
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c