Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
c3c93bcc9d7cf09e654aed755118dc42_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
c3c93bcc9d7cf09e654aed755118dc42_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c3c93bcc9d7cf09e654aed755118dc42
-
SHA1
c0fa398ff4e417f227437ac86c2c413ce2780553
-
SHA256
15fc496e1a8c2e1c17ef2dbf6fa1652413dc871ea598f12b6d1ea8cc4489665a
-
SHA512
78cd2acaa474107add69b9dda4b927bc5c1ff78fd1e72328b97a02575516ddc93254a093c9580b37b020572a7cceeeebdf8c9f6bf51e778b17c3a3414f92c8a2
-
SSDEEP
24576:YVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:YV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1164-5-0x0000000002510000-0x0000000002511000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2728 mfpmp.exe 2296 calc.exe 2040 taskmgr.exe -
Loads dropped DLL 7 IoCs
pid Process 1164 Process not Found 2728 mfpmp.exe 1164 Process not Found 2296 calc.exe 1164 Process not Found 2040 taskmgr.exe 1164 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lnxdhmhg = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\xhgrTny\\calc.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA calc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 rundll32.exe 1984 rundll32.exe 1984 rundll32.exe 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found 1164 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1164 wrote to memory of 2956 1164 Process not Found 30 PID 1164 wrote to memory of 2956 1164 Process not Found 30 PID 1164 wrote to memory of 2956 1164 Process not Found 30 PID 1164 wrote to memory of 2728 1164 Process not Found 31 PID 1164 wrote to memory of 2728 1164 Process not Found 31 PID 1164 wrote to memory of 2728 1164 Process not Found 31 PID 1164 wrote to memory of 2652 1164 Process not Found 33 PID 1164 wrote to memory of 2652 1164 Process not Found 33 PID 1164 wrote to memory of 2652 1164 Process not Found 33 PID 1164 wrote to memory of 2296 1164 Process not Found 34 PID 1164 wrote to memory of 2296 1164 Process not Found 34 PID 1164 wrote to memory of 2296 1164 Process not Found 34 PID 1164 wrote to memory of 2844 1164 Process not Found 35 PID 1164 wrote to memory of 2844 1164 Process not Found 35 PID 1164 wrote to memory of 2844 1164 Process not Found 35 PID 1164 wrote to memory of 2040 1164 Process not Found 36 PID 1164 wrote to memory of 2040 1164 Process not Found 36 PID 1164 wrote to memory of 2040 1164 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3c93bcc9d7cf09e654aed755118dc42_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\vqq5\mfpmp.exeC:\Users\Admin\AppData\Local\vqq5\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2728
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe1⤵PID:2652
-
C:\Users\Admin\AppData\Local\fMPM\calc.exeC:\Users\Admin\AppData\Local\fMPM\calc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2296
-
C:\Windows\system32\taskmgr.exeC:\Windows\system32\taskmgr.exe1⤵PID:2844
-
C:\Users\Admin\AppData\Local\WgmP29\taskmgr.exeC:\Users\Admin\AppData\Local\WgmP29\taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD583203eceee3ece6dad9fc6ea3835e3f9
SHA180a050ac15213cd09db8b9a49fee6d37c68b83dd
SHA256f82b55acd5bf9414b4c8f14910d60d8acf7e76d5465c7695b99134905108b056
SHA51250dc5292d3a3efa7f6c306d07caad9f2d8148ff3262785e5479cba32d12c54383a900073bfe5b820c8403202e8c37d8fbf0c3809fb33b61764aea17b84178b53
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
Filesize
1KB
MD5ede1c45ece89c406fb5ce6ee9ad255dd
SHA143006a8e68e4cc89d0b7ea784169ecb1dd7cbe56
SHA2565f72237944e5bd663e570e62d7d398176b32eaf211528ff1c790499d95268950
SHA51287a05a2cc49e87c439d4c9b6dc7393de3992fb64a38fd9316c729b0a9eaafb420cccc6bbba43eb22693e87b5ab7a4958534ad2e8c7433441b598b7892ae73a2c
-
Filesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
Filesize
1.2MB
MD5d18caef102164fffc4a15cfdcd176f39
SHA17d3653945945eacbc78a958aad4bb73c2e50cd3c
SHA2562aee4453cc8f78619becd46af9d5673d518bfbb33183c37923c4bcda9b6ee5b2
SHA5129b2eaa2f4cdc978d825258d43ae8967139dd92e7ef2e467cb16d1cdcfd3a8ba222451004074d418487d95b8687f984ae3a99bb6245a25d202e981ac514bb54f4
-
Filesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
Filesize
1.2MB
MD5454c61a3f60bf09b9d79061ed478c469
SHA1c4d255536ee130b609a96672b9623f3632147d90
SHA256a950951526537fac11bd492f85fc58662cd6b93790c45220d6cd6560c73569ce
SHA51248864b9ca59ff3d9b27745bf3310e5f0717f1660e5bf6866678e2eb745b4cca2db56bcf7fd035e2b6f1f2c1d2017649aa9697d4c28e58c6dd8645382dc67bf06