Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c572ea4c00bbf5b57f75082b7abc9d4a
-
SHA1
b607b459531d5d3629d83b74a3e7064ab0a5172d
-
SHA256
532c4a9fdcc00ccbbde0658accc2d5d76862011038a28136e5c19f312e1cd7a9
-
SHA512
8de6287aae880a643a3cd3a17315d8c739b3bf3ee31df224d7d979a7e7a8b758b7429b27ac0c2ed2752a77995d5e9c4552adcf71d0b13baca9fb5492f6059ead
-
SSDEEP
24576:BuYfg4LhHr4NFXKJO1aUyDBvZ2+ITXmpclO9d:T9cKrU6ZWbAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1236-5-0x0000000002860000-0x0000000002861000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rrinstaller.exeSystemPropertiesPerformance.exemsinfo32.exepid Process 2956 rrinstaller.exe 1276 SystemPropertiesPerformance.exe 1508 msinfo32.exe -
Loads dropped DLL 7 IoCs
Processes:
rrinstaller.exeSystemPropertiesPerformance.exemsinfo32.exepid Process 1236 2956 rrinstaller.exe 1236 1276 SystemPropertiesPerformance.exe 1236 1508 msinfo32.exe 1236 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\PrivacIE\\8P0yQ9\\SystemPropertiesPerformance.exe" -
Processes:
rundll32.exerrinstaller.exeSystemPropertiesPerformance.exemsinfo32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1236 wrote to memory of 2616 1236 30 PID 1236 wrote to memory of 2616 1236 30 PID 1236 wrote to memory of 2616 1236 30 PID 1236 wrote to memory of 2956 1236 31 PID 1236 wrote to memory of 2956 1236 31 PID 1236 wrote to memory of 2956 1236 31 PID 1236 wrote to memory of 1416 1236 32 PID 1236 wrote to memory of 1416 1236 32 PID 1236 wrote to memory of 1416 1236 32 PID 1236 wrote to memory of 1276 1236 33 PID 1236 wrote to memory of 1276 1236 33 PID 1236 wrote to memory of 1276 1236 33 PID 1236 wrote to memory of 2040 1236 34 PID 1236 wrote to memory of 2040 1236 34 PID 1236 wrote to memory of 2040 1236 34 PID 1236 wrote to memory of 1508 1236 35 PID 1236 wrote to memory of 1508 1236 35 PID 1236 wrote to memory of 1508 1236 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c572ea4c00bbf5b57f75082b7abc9d4a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\pW7Lu\rrinstaller.exeC:\Users\Admin\AppData\Local\pW7Lu\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2956
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1416
-
C:\Users\Admin\AppData\Local\Pxez8bt\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\Pxez8bt\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1276
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:2040
-
C:\Users\Admin\AppData\Local\fk9TXgT\msinfo32.exeC:\Users\Admin\AppData\Local\fk9TXgT\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e280ab4cf806a30752eaa0194a6b42e8
SHA1aea7ad25d66af3881b43f1b9abc134448dadaf82
SHA25681f40d8b42b1bfb0d3feeef13585c56224c7f0556c01d12c8f4461837fb41e78
SHA5127d7c708ffa8dc8fda940dc90e58bb334413f68ed088b5c1eb334fdcbdbb95d5f010d981d1b52bc47403000204cde72906a47c71700bae569d988903ddfef19b6
-
Filesize
1.2MB
MD5a4d5201ed7bf8144e5b1abd08ec5c8fd
SHA1583b973ee979defd66b30c1a24c1efac8bf36446
SHA256a573fbe1ca995a7a32ca4a69c9bf8f619e05f649d7e19a2f1b92458612aad5ec
SHA51264c143907871c50c3fd4ebdb67ecc655196441efa21cd057db875fd65ad9fc0eb0c43d37c2ca4ebaf45241c079d9439671a677a8792399d97ef886d6a4407da0
-
Filesize
370KB
MD5d291620d4c51c5f5ffa62ccdc52c5c13
SHA12081c97f15b1c2a2eadce366baf3c510da553cc7
SHA25676e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae
SHA51275f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b
-
Filesize
1.2MB
MD5d4e796577fb3855b38f2eb9666ad4db9
SHA12b0cc4c84c18161d5a080b8e7ca21b39f9a56610
SHA256be93d6490d859450f0b9819d23796b12f4bc905158a145bac7ec898531c38b8a
SHA512247b1298d9639d4da3a411c119f9875854832d7b89a44041813a2fc209bf8f6b13f362d7e773f6abda46595069eed62276cd20c80e7d17d413aeca38e09b4aa5
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
1012B
MD55bb488c04101ae19c65301778f523343
SHA175097b2fad844a1252a897a1f473b2a93535bd67
SHA2564fbe676c3ab5ff7a9e492adcd5818eb6a0c3ac03476fc018d703e2385d0f0d27
SHA51213d0c1e5f32a292481e2200472ae1aedecbe12a1f4d74f5ca6a02eee663928de50f47af687c48e0f402f2898a82c30867d99b6e5a5e02b78e5004f0c24e57417
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72