Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
c1fad4e897cfb353e662f497347789ac_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
c1fad4e897cfb353e662f497347789ac_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c1fad4e897cfb353e662f497347789ac
-
SHA1
a99d03b2b5f0cb26545802db4e02bc084167538b
-
SHA256
8bf41e771cc975937d4117383a49b019d875fe2dcae707a9c85962982a31e608
-
SHA512
0249475d0007c2ebdc99cf646c0172654df481d3be3b6821d27110ed444af2eab1ec1451df24e30afae68e3f2a098d358af877790833ee6993d041d4aff9eb2c
-
SSDEEP
24576:xuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Nd:j9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x00000000024F0000-0x00000000024F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2916 rstrui.exe 2300 fveprompt.exe 2060 icardagt.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2916 rstrui.exe 1196 Process not Found 2300 fveprompt.exe 1196 Process not Found 2060 icardagt.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lnxdhmhg = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\fF7sW\\FVEPRO~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 regsvr32.exe 1528 regsvr32.exe 1528 regsvr32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2788 1196 Process not Found 31 PID 1196 wrote to memory of 2788 1196 Process not Found 31 PID 1196 wrote to memory of 2788 1196 Process not Found 31 PID 1196 wrote to memory of 2916 1196 Process not Found 32 PID 1196 wrote to memory of 2916 1196 Process not Found 32 PID 1196 wrote to memory of 2916 1196 Process not Found 32 PID 1196 wrote to memory of 1848 1196 Process not Found 33 PID 1196 wrote to memory of 1848 1196 Process not Found 33 PID 1196 wrote to memory of 1848 1196 Process not Found 33 PID 1196 wrote to memory of 2300 1196 Process not Found 34 PID 1196 wrote to memory of 2300 1196 Process not Found 34 PID 1196 wrote to memory of 2300 1196 Process not Found 34 PID 1196 wrote to memory of 1712 1196 Process not Found 35 PID 1196 wrote to memory of 1712 1196 Process not Found 35 PID 1196 wrote to memory of 1712 1196 Process not Found 35 PID 1196 wrote to memory of 2060 1196 Process not Found 36 PID 1196 wrote to memory of 2060 1196 Process not Found 36 PID 1196 wrote to memory of 2060 1196 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c1fad4e897cfb353e662f497347789ac_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2788
-
C:\Users\Admin\AppData\Local\Z3d7n\rstrui.exeC:\Users\Admin\AppData\Local\Z3d7n\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2916
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:1848
-
C:\Users\Admin\AppData\Local\qOsiuw5N\fveprompt.exeC:\Users\Admin\AppData\Local\qOsiuw5N\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2300
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵PID:1712
-
C:\Users\Admin\AppData\Local\9SaABmK\icardagt.exeC:\Users\Admin\AppData\Local\9SaABmK\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e1f62bfe2093bb25340ffaf2b1f8a220
SHA18bf1556d2411a4776f6d550d0c08fc1dca245d78
SHA256fe98096788f6ab046c3a128d0a84deb9ff2561431de95335c73d7a6535201260
SHA512fb574c19d4eb1aed7461732a531c5444c454b15256cbfefd389b098bd7d5f57c0492f5da98e21ad34e7286999ef72802bc13760b05830985ce25ad90a5bb7f47
-
Filesize
1.2MB
MD587826a6b2177b21ae5a159efc89e2f06
SHA17f2654d95e10f0212f7a0e607452d1fb97c54895
SHA256870f77b347354292777faa336113a1c6ffad34150caabdc0931fab99adcc8075
SHA512a94d1e42155e8c2378172732ea74e8d4e3b9f03b61fb71a4306779e80ca0b3e3c7c8eed30ab579469560693011fe0ca205149902bb69e49a9ea615f04d668799
-
Filesize
1KB
MD5a14e00919ea006d2505813e85ccaf29c
SHA1ce245cb177de735024302b190f229ed924f0792a
SHA256f081134b4e7751b86c67e132881c34c1932c2241a0a7cbbea5e0b4da383312c4
SHA512f3aabbba49190dec9342cf7eaa6ed1af8cd6aaf40880a1aad7bf7a24e9c0f0e7a9ab80545e6efe5dff3094d47ccd383df0fb32099813e22243b98e97e69c058c
-
Filesize
1.2MB
MD5f966deecd1b9e32a8904371620f1e5ff
SHA1dd60c0074efbe956f5eed75fe7eb086df8385cb4
SHA25676aee4bb585677620572f2a8b15b2c82e43b131c97b9784af8e3b1897bdc41f9
SHA512d24f8550b84c029884b7e1d0edb2e16c7d202387a108db9b6a639fe2dd2366c6b9ef6b6e3d9046552623c0435ecc457db1db21718c45e34ff4cf18d4e118e507
-
Filesize
1.3MB
MD52fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc