Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c11d18fc3052e4bd6c7e1930289ff881
-
SHA1
a1efb5769620a2d2a01b9e8879e2c7ad6d3e6098
-
SHA256
0acbdd88ad3bfa71a43bfc53fd70200c636ed15847b4587c26b73dd17d2834f0
-
SHA512
2b9a906d482462d17051173427fb71a75e607f2353918983d903fb7c4086a9967fea47cc3e69a539cb4a7ed5288bb4d000c6f1351481e4bf6ac95e97cbbbe5d1
-
SSDEEP
24576:5uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:r9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-5-0x0000000002EB0000-0x0000000002EB1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2884 fveprompt.exe 2916 slui.exe 2032 msdtc.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2884 fveprompt.exe 1244 Process not Found 2916 slui.exe 1244 Process not Found 2032 msdtc.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qiarkhdaw = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\aZZmBI2V7Tf\\slui.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3064 rundll32.exe 3064 rundll32.exe 3064 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 804 1244 Process not Found 29 PID 1244 wrote to memory of 804 1244 Process not Found 29 PID 1244 wrote to memory of 804 1244 Process not Found 29 PID 1244 wrote to memory of 2884 1244 Process not Found 30 PID 1244 wrote to memory of 2884 1244 Process not Found 30 PID 1244 wrote to memory of 2884 1244 Process not Found 30 PID 1244 wrote to memory of 2500 1244 Process not Found 31 PID 1244 wrote to memory of 2500 1244 Process not Found 31 PID 1244 wrote to memory of 2500 1244 Process not Found 31 PID 1244 wrote to memory of 2916 1244 Process not Found 32 PID 1244 wrote to memory of 2916 1244 Process not Found 32 PID 1244 wrote to memory of 2916 1244 Process not Found 32 PID 1244 wrote to memory of 2564 1244 Process not Found 33 PID 1244 wrote to memory of 2564 1244 Process not Found 33 PID 1244 wrote to memory of 2564 1244 Process not Found 33 PID 1244 wrote to memory of 2032 1244 Process not Found 34 PID 1244 wrote to memory of 2032 1244 Process not Found 34 PID 1244 wrote to memory of 2032 1244 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c11d18fc3052e4bd6c7e1930289ff881_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:804
-
C:\Users\Admin\AppData\Local\GPK6criZ\fveprompt.exeC:\Users\Admin\AppData\Local\GPK6criZ\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2884
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2500
-
C:\Users\Admin\AppData\Local\vrMSSHCLX\slui.exeC:\Users\Admin\AppData\Local\vrMSSHCLX\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2916
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:2564
-
C:\Users\Admin\AppData\Local\7i0zckNl\msdtc.exeC:\Users\Admin\AppData\Local\7i0zckNl\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52693ecb5c2725c3c27e76dac5c792afd
SHA147e7e0ad895881c79e1cde1fa82dce6a7de343f1
SHA256adcb5392a1ff7430dcf53ad5c170d9a579080f38bb83c1dddfc4760ef5542f5d
SHA512bc69b915f682cf997695b86df26f13e1691f7cc198f65c1a844c350d832f2b8a64416e5955bf27a715fb6b4fbc7268fa51f4120115e3b9dfb998087b11f24bdd
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
Filesize
1.2MB
MD51ab88a622ffa6282dd7bea4b41247ffa
SHA147d958fa6e637f862a5e28a5a14ea78ecacd362c
SHA25605044e44bc19d8b8c7532aed15465c99054dc2d8441e80e01b715c5680146828
SHA51219b9224bd45860911b8f196bcecc332472694be94f82a378aa2b4d3e0c89c6174074d3e2967b84d6b4f134f8af6673f7770658df5651d8108c6816951ab07c77
-
Filesize
1.2MB
MD582ad36a2f37380c254363d3cb4619d94
SHA1a3aaf6a0d872af77b964c3894b904a3e33fe7f08
SHA2564b049dc280227f0d07855bf0dd43cad3b6f9771ff8c9e8f6ba5edff3c6f7e2f2
SHA5127048a2ff8adfccb172b6044ff0b5bb60b77c76e085f494f238f6e305603f24138d3795a27706d67fef8b93b2d6d8ad30db7df41c3052a7c08669a0668f9e3923
-
Filesize
974B
MD59ac5325fdb08fcfe0d1481f4509e06a2
SHA14145e620db93a65d715a4bfbce6be1cd50d61394
SHA2569aa84c89ca2fcb8a1c5cdf2aa7ddfef6ecf08ecae6d13ff08603c1527ede6eda
SHA512a86adb6a94bf7c59a80dd4b5900747f174b1aee9d2684f27de99199a3206b88e0cff7a882fca42eb49c3246474006e2a013a722ebd94bbc131dd183e34ce5c26
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c