Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 16:30
Static task
static1
Behavioral task
behavioral1
Sample
b8582e40b778541ea3445524e95735f2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8582e40b778541ea3445524e95735f2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b8582e40b778541ea3445524e95735f2_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
b8582e40b778541ea3445524e95735f2
-
SHA1
bc13cb980db1cac969ca37b8bdcf9dc7226940d5
-
SHA256
fae74f1cdc0e33a7bef8b67415b052be1cccb05d1f420a1ca2e03a9928c02280
-
SHA512
8a66492bad9431a5a928cce016d4639a011161fcd9caa35bc74cffce4dd1f73e2ed8b79cf0599128ebaa05f298bc88821751b63938d90059347dd1e4848a541a
-
SSDEEP
24576:DuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:t9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-5-0x0000000002530000-0x0000000002531000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2644 notepad.exe 540 dialer.exe 1004 sdclt.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2644 notepad.exe 1244 Process not Found 540 dialer.exe 1244 Process not Found 1004 sdclt.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qntpnaypazzlupr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\JIYI\\dialer.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 regsvr32.exe 2028 regsvr32.exe 2028 regsvr32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2764 1244 Process not Found 31 PID 1244 wrote to memory of 2764 1244 Process not Found 31 PID 1244 wrote to memory of 2764 1244 Process not Found 31 PID 1244 wrote to memory of 2644 1244 Process not Found 32 PID 1244 wrote to memory of 2644 1244 Process not Found 32 PID 1244 wrote to memory of 2644 1244 Process not Found 32 PID 1244 wrote to memory of 1792 1244 Process not Found 33 PID 1244 wrote to memory of 1792 1244 Process not Found 33 PID 1244 wrote to memory of 1792 1244 Process not Found 33 PID 1244 wrote to memory of 540 1244 Process not Found 34 PID 1244 wrote to memory of 540 1244 Process not Found 34 PID 1244 wrote to memory of 540 1244 Process not Found 34 PID 1244 wrote to memory of 332 1244 Process not Found 35 PID 1244 wrote to memory of 332 1244 Process not Found 35 PID 1244 wrote to memory of 332 1244 Process not Found 35 PID 1244 wrote to memory of 1004 1244 Process not Found 36 PID 1244 wrote to memory of 1004 1244 Process not Found 36 PID 1244 wrote to memory of 1004 1244 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b8582e40b778541ea3445524e95735f2_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:2764
-
C:\Users\Admin\AppData\Local\fBX2qav\notepad.exeC:\Users\Admin\AppData\Local\fBX2qav\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2644
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:1792
-
C:\Users\Admin\AppData\Local\iZyAbmCQg\dialer.exeC:\Users\Admin\AppData\Local\iZyAbmCQg\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:540
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:332
-
C:\Users\Admin\AppData\Local\Y4iY\sdclt.exeC:\Users\Admin\AppData\Local\Y4iY\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5752fa7602da2a13e20398516f4c725dc
SHA132b403fa48d6541c6cad866de51791c2b92eaafb
SHA256c12f8c8c2cefe07efeb601d76ca5f5830463b4c0c0bcfeab406340fd1c06e30f
SHA5129893eb3ef0b16ef47398fb9cc6960bb29d96e1ea5aff5143f4fe38c0284775db9240f938ef175e9fef21c3a519ce82dfa346cf4c5462522361f07ba0223477ea
-
Filesize
1.2MB
MD559d4d83382a2154adaf498335a93012f
SHA1a7e1df292f9d2338f592d8f368125bae62b0edcd
SHA256264242f056ae9ae10650db004380adab28b51c10a0d990d1087a6c4b6c094154
SHA512af30363246eaa22a435abe26e1c54cd27a08c038fdcd8d9188605984c89e79201d95e498c66772094004f5cbfeb2ca49302955dbb9843ad4b702d83658e81c30
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
Filesize
1.2MB
MD58e650945ae54d9c7f14f8e5b555932e0
SHA1b7877d706496cff10f7d212e862c3d72229b2b35
SHA256215663cc51048af13eb031a99dc260790c971b9d9d6628bba3cee2116c1464fa
SHA512ef3dc416789f4d3c904e37e75c95b7191a2b12ea20f4d8433a080d9b3ff3e6a59333741393b90fdfb62283fa5deb12b11935cebf6347a261f210f3aa53203027
-
Filesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
Filesize
1KB
MD5d4fe5dae5ba99d67a7df3e202d99d64d
SHA1ae558d22578d310f3256265eb12b02091ec148c2
SHA2565eab417b37d37459d8e7ef5a7ffe87d8a4c41a23744eb82511bddda1da863112
SHA5126c964eafdcbd4b9abcaf4c980f0b0538e57dafda3b47d3b3600d65fd9c209c687da0695dccdf09835148123a1f3a21c211cd640b2f37dde9e05d2f827f978783
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13