Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
bac626c330c4f54cf739b1840fe180b4_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
bac626c330c4f54cf739b1840fe180b4_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
bac626c330c4f54cf739b1840fe180b4
-
SHA1
ac00babc73192095dd0a99e15052dbc94b0076f1
-
SHA256
d590a58d203fa7da5c807e2bdd946aaf55f04d2413ad267dc07bbc97de70476b
-
SHA512
7452f661484866a623ab1c1b44c5cec0074f9f642ad6d15c0f3d7f1297dd3c224fa67f59d9e626627374ad4a57fdc1bb8be2a5e89a8f5a91cb3ef5d8732de942
-
SSDEEP
24576:uuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:O9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1064-5-0x00000000020B0000-0x00000000020B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2948 BdeUISrv.exe 2224 mspaint.exe 2812 rdpshell.exe -
Loads dropped DLL 7 IoCs
pid Process 1064 Process not Found 2948 BdeUISrv.exe 1064 Process not Found 2224 mspaint.exe 1064 Process not Found 2812 rdpshell.exe 1064 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Excel\\NzIY\\mspaint.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpshell.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 rundll32.exe 2380 rundll32.exe 2380 rundll32.exe 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found 1064 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2628 1064 Process not Found 31 PID 1064 wrote to memory of 2628 1064 Process not Found 31 PID 1064 wrote to memory of 2628 1064 Process not Found 31 PID 1064 wrote to memory of 2948 1064 Process not Found 32 PID 1064 wrote to memory of 2948 1064 Process not Found 32 PID 1064 wrote to memory of 2948 1064 Process not Found 32 PID 1064 wrote to memory of 1880 1064 Process not Found 33 PID 1064 wrote to memory of 1880 1064 Process not Found 33 PID 1064 wrote to memory of 1880 1064 Process not Found 33 PID 1064 wrote to memory of 2224 1064 Process not Found 34 PID 1064 wrote to memory of 2224 1064 Process not Found 34 PID 1064 wrote to memory of 2224 1064 Process not Found 34 PID 1064 wrote to memory of 1912 1064 Process not Found 35 PID 1064 wrote to memory of 1912 1064 Process not Found 35 PID 1064 wrote to memory of 1912 1064 Process not Found 35 PID 1064 wrote to memory of 2812 1064 Process not Found 36 PID 1064 wrote to memory of 2812 1064 Process not Found 36 PID 1064 wrote to memory of 2812 1064 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bac626c330c4f54cf739b1840fe180b4_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2628
-
C:\Users\Admin\AppData\Local\StKiP\BdeUISrv.exeC:\Users\Admin\AppData\Local\StKiP\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2948
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:1880
-
C:\Users\Admin\AppData\Local\kgtSgP\mspaint.exeC:\Users\Admin\AppData\Local\kgtSgP\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2224
-
C:\Windows\system32\rdpshell.exeC:\Windows\system32\rdpshell.exe1⤵PID:1912
-
C:\Users\Admin\AppData\Local\u26mv\rdpshell.exeC:\Users\Admin\AppData\Local\u26mv\rdpshell.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57fdc85ab42f0c0ce03d0eb160d218fab
SHA19bb7491990d0cf2355aa9e73254978e70ae5acb2
SHA256ab1633f88aaaeb58ca7846b1610cc83c5f77d5e5109baee1cd743ef600ec085a
SHA51258aa58791696bc7236e50ae6d3254b9d1f161c35a3f0874cf2cb4d9a9181ab25658efb8ce9d601a036bf6844c4658e2ecc8c150548bf79d49093e799e4a74163
-
Filesize
1.2MB
MD5dc77cbfc49a7e6a7c21db2e72c65ea2b
SHA12c40b1d6c56bb1513357647402ba6ce0abb847d0
SHA256a8765e5082e0a8e67c95353d37721b2bda263b1d6bd91f02f1d755ab476ebf9c
SHA5129eae4c5ec1123ced9bb4ef80a2db0f875b838969cbaf9041eb71f76e4159309a408e72edfbadc39b2a9af936f5170dbe10a75702ca2edbf4115beb5e7188e4b6
-
Filesize
1.2MB
MD5c24295d82ce5dbe44d92f01e59576e92
SHA15bf2e170d632569849fc5f60339026b76045aa6f
SHA2562be4147f7c4e507b056b707bf25ef36ec4da43a7b4bd2818df6bddd2fe2940c0
SHA5129407cc42aaacd623f199afb5fbf161965c4d069e73334c8284276173e2b4ff806a455c56bd0d6eba3503081a236d9c4a6e946744a8a5007c16f1bb7fdabac032
-
Filesize
732B
MD5b525f006e506a8100703c5c6a59c62cf
SHA189c9f8959f3c87ad5bfd41d5f2db3c6042c4eed4
SHA25696c1b871a93c1f4a7650dc35c78451cdbb0ded22654f6dbfb63acf69f33b656a
SHA5126c4a18fc111fd7083659cb8374e72229b3d7522d7db9f71d7e2925a5645523f19bc3f9e5036b6fe0ea7717b93fd4d3efb5f1664532998082fa8b6d784d54376f
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681
-
Filesize
292KB
MD5a62dfcea3a58ba8fcf32f831f018fe3f
SHA175f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b
SHA256f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e
SHA5129a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603