Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
c0531aa81daf874d07f3ac24ce59d4f1_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c0531aa81daf874d07f3ac24ce59d4f1_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c0531aa81daf874d07f3ac24ce59d4f1
-
SHA1
8aa0b1e290bf9b4335a8448989910b1f9827157e
-
SHA256
7e4e5b66b159d527d7f95083f708b94777aad062e5e665f3a41eb07d7891a60e
-
SHA512
abc190f52bc1e5f0a0368ac6f830254054cc5e574614c803cde4534887ee5e1e2387878ac0d72dc17fd121293815bbd29c29b34a077a2726b11b69a78b17666e
-
SSDEEP
24576:PuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:x9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x0000000002910000-0x0000000002911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2656 shrpubw.exe 1296 SystemPropertiesDataExecutionPrevention.exe 2028 mfpmp.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2656 shrpubw.exe 1196 Process not Found 1296 SystemPropertiesDataExecutionPrevention.exe 1196 Process not Found 2028 mfpmp.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Madzpveq = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\JYxwU\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 rundll32.exe 2256 rundll32.exe 2256 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2880 1196 Process not Found 30 PID 1196 wrote to memory of 2880 1196 Process not Found 30 PID 1196 wrote to memory of 2880 1196 Process not Found 30 PID 1196 wrote to memory of 2656 1196 Process not Found 31 PID 1196 wrote to memory of 2656 1196 Process not Found 31 PID 1196 wrote to memory of 2656 1196 Process not Found 31 PID 1196 wrote to memory of 2328 1196 Process not Found 32 PID 1196 wrote to memory of 2328 1196 Process not Found 32 PID 1196 wrote to memory of 2328 1196 Process not Found 32 PID 1196 wrote to memory of 1296 1196 Process not Found 33 PID 1196 wrote to memory of 1296 1196 Process not Found 33 PID 1196 wrote to memory of 1296 1196 Process not Found 33 PID 1196 wrote to memory of 1504 1196 Process not Found 34 PID 1196 wrote to memory of 1504 1196 Process not Found 34 PID 1196 wrote to memory of 1504 1196 Process not Found 34 PID 1196 wrote to memory of 2028 1196 Process not Found 35 PID 1196 wrote to memory of 2028 1196 Process not Found 35 PID 1196 wrote to memory of 2028 1196 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0531aa81daf874d07f3ac24ce59d4f1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:2880
-
C:\Users\Admin\AppData\Local\J970x\shrpubw.exeC:\Users\Admin\AppData\Local\J970x\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2656
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:2328
-
C:\Users\Admin\AppData\Local\R1u6IZ\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\R1u6IZ\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1296
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:1504
-
C:\Users\Admin\AppData\Local\YV8kdzAr\mfpmp.exeC:\Users\Admin\AppData\Local\YV8kdzAr\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f9f48e30f5bdd087ea9be50d9606bf20
SHA1c954fd05892d4d322d62faca0212efd368899e81
SHA25698cf42eee05e38827b1769eb995f0ae40b3145bea38d2ff7821e1ad308172708
SHA5129e4d7cb08c5c5391837ac323d61f8799d68f4768f12a480e3720363e15219c7adc4d5d24da95a427d1206aba00f0e5a2a8ae13cd9126723df2617d69d251a9fb
-
Filesize
398KB
MD529e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
Filesize
1.2MB
MD501568164edf320041cefbc10456c71df
SHA1559f10c325e01de4c9375e0a6a3c51dc2a2d4cb3
SHA2565eb332db6dc0020c61b7ea4f484220e704909b6d51cadd0a9ae4eb583cfe5e48
SHA51232cc988863147e6a86688cdcb9bbadffc9015c88f84a96684ab2529fdc8aec04d70499b0e4ca3c118f3971f5845ff044e294f875a780773de762a4260307951c
-
Filesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
Filesize
1KB
MD58c50aa6e85b7800705c690d9e53c316a
SHA1d3d759c26d9e5630492751e9e5358e85dc1712a3
SHA2560888ccb6df54ad28ebf95c5206934afaf0c7f4efdc3be1276928a645eebf37e1
SHA5125bf4ccd8f5f614832b3a733b0a20f69e976c4b921487cc7d82365cf926bbe12c42390e465dc809ab8dcc031525794e35a6ef061e63f5c7a89624092eacb533c3
-
Filesize
1.2MB
MD59b90f901f6461a109f3d722b4e07ffaa
SHA12269e704a49e9408704f3972aac4eb460b9e157f
SHA2568a72ed3e83564b94d9308933ba9697851894b618b86e6056f6183281e69a1819
SHA51215c34cee94c7bcd9a3dc0922bc4e7b6f9d179f7eca1c1680ad7fd7b8d74bc905976cc4719b24deab837da92bcdf0e70368878ac761f12834dc52af3873f2538f
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc