Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
bbd4e284b00e85697e11b7d15c813adc_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
bbd4e284b00e85697e11b7d15c813adc_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
bbd4e284b00e85697e11b7d15c813adc
-
SHA1
54cdb498f7e6cc601dced0637ffd830fc53820d2
-
SHA256
0f1c282e13dfd7aa0eabd5cf404e21768d5e9c703ae18a4c919576e675a45f0e
-
SHA512
40aa178bb1df2ec6e71323d67baa34b57887325391f5580b6e1ba2f5ead0a450e08f7802777967d41ddba114761cef900cb5b88654db04cc346e4be867da8c9f
-
SSDEEP
24576:7uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:l9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1272-5-0x0000000002830000-0x0000000002831000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
shrpubw.exeDevicePairingWizard.exeicardagt.exepid Process 2824 shrpubw.exe 2012 DevicePairingWizard.exe 2756 icardagt.exe -
Loads dropped DLL 7 IoCs
Processes:
shrpubw.exeDevicePairingWizard.exeicardagt.exepid Process 1272 2824 shrpubw.exe 1272 2012 DevicePairingWizard.exe 1272 2756 icardagt.exe 1272 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qiarkhdaw = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\zOGq197oVB\\DevicePairingWizard.exe" -
Processes:
rundll32.exeshrpubw.exeDevicePairingWizard.exeicardagt.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1272 wrote to memory of 2184 1272 30 PID 1272 wrote to memory of 2184 1272 30 PID 1272 wrote to memory of 2184 1272 30 PID 1272 wrote to memory of 2824 1272 31 PID 1272 wrote to memory of 2824 1272 31 PID 1272 wrote to memory of 2824 1272 31 PID 1272 wrote to memory of 2072 1272 32 PID 1272 wrote to memory of 2072 1272 32 PID 1272 wrote to memory of 2072 1272 32 PID 1272 wrote to memory of 2012 1272 33 PID 1272 wrote to memory of 2012 1272 33 PID 1272 wrote to memory of 2012 1272 33 PID 1272 wrote to memory of 2548 1272 34 PID 1272 wrote to memory of 2548 1272 34 PID 1272 wrote to memory of 2548 1272 34 PID 1272 wrote to memory of 2756 1272 35 PID 1272 wrote to memory of 2756 1272 35 PID 1272 wrote to memory of 2756 1272 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbd4e284b00e85697e11b7d15c813adc_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Local\Mn6\shrpubw.exeC:\Users\Admin\AppData\Local\Mn6\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2824
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵PID:2072
-
C:\Users\Admin\AppData\Local\ASK\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\ASK\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2012
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:2548
-
C:\Users\Admin\AppData\Local\8sgxLNXc\icardagt.exeC:\Users\Admin\AppData\Local\8sgxLNXc\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55378bec6f732365080b82e35dab09740
SHA1364561acd1abd7d72617acf1904199cbc458f275
SHA256101bbb4deccbc560a4c52b0ab89e6a27ba73990464010c533141e13581f8e268
SHA5128b8dfa850eeb30882e4209216bce931583c0600f7a180847047417d7a81b7765539ab410fe4e30c6af7643481ba50b0fb1cabf737e6a9576b8ad604eb91b3fb6
-
Filesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
Filesize
1.2MB
MD5b378c12a8edcef69bd89f1da05a55437
SHA19c344c6e30ff28a0f4d0a0fc8311cc9c38fa20c9
SHA2569594093bc7ed51790edc25284afe3e9ab147c185914a07e23c018a0c402e75d7
SHA512debf655fc71da1a6bca2a4b543abab1567d56352cbab683323378fb8c7d6c88727a55377d584bfa6a01fbcfffaf7e9d362fd711ec7bcf29eed718fa1743ad02f
-
Filesize
1.2MB
MD58e7df9b9000082aeccf4e74e0699a36e
SHA1a2f808fc754ec4ce22b80ada40ae7310b6bda59c
SHA25632f5bd632189d3f83fb00cf60c6caa93aa0a8f5b28ae3e14f90e4e9c1217191c
SHA512f098323cdb8feee24b287ebdcc7cd4709a928468aaf1ad032056393b16ff25b77cf920976c5a864d3ddcd1f3070f61403a2154389500e0ca8239cbced1018acf
-
Filesize
1KB
MD53ca0fe8dc7e385d069caf1ec7932cb93
SHA173190e77a6ff4d0df607b4b815e81434b0e90949
SHA2568aae590ab3610d0b82df673a250cccd6afe8fec202006fd4d2b9d1d774a63e7d
SHA512dc851e1006f94ee7312d1ac5240c4e354b343261f7d6d2c8046627ca8d6ae5e5f07b9caee72927d534e35b4ff2604d62cdfc6bc9534671b6b960afc0cb6ac270
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
398KB
MD529e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4