Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
c7b6baa928b733cbc9cc203c4f3a8f23_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c7b6baa928b733cbc9cc203c4f3a8f23_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c7b6baa928b733cbc9cc203c4f3a8f23
-
SHA1
19b6883c6d058bd69f8e91cc9de095b885066eec
-
SHA256
7bc99dbbeb888112a6de767ad2977ad04ea059ea9e5fe8fce9c22e2d941659bc
-
SHA512
a6b594235fa702d123957e0120be2d0f95c04c09454c1127df600e41c2130649e9b47ccc03d5e71855b8325dd79e95df92fed00a39d9bd4500ded6aeebc29514
-
SSDEEP
24576:ruYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:19cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000002D40000-0x0000000002D41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dvdupgrd.exePresentationSettings.exeVaultSysUi.exepid Process 2796 dvdupgrd.exe 2780 PresentationSettings.exe 2728 VaultSysUi.exe -
Loads dropped DLL 8 IoCs
Processes:
dvdupgrd.exePresentationSettings.exeVaultSysUi.exepid Process 1196 2796 dvdupgrd.exe 1196 2780 PresentationSettings.exe 1196 1196 2728 VaultSysUi.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qdgopofbxbljb = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\rD\\PresentationSettings.exe" -
Processes:
rundll32.exedvdupgrd.exePresentationSettings.exeVaultSysUi.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationSettings.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VaultSysUi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2460 rundll32.exe 2460 rundll32.exe 2460 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1196 wrote to memory of 2648 1196 31 PID 1196 wrote to memory of 2648 1196 31 PID 1196 wrote to memory of 2648 1196 31 PID 1196 wrote to memory of 2796 1196 32 PID 1196 wrote to memory of 2796 1196 32 PID 1196 wrote to memory of 2796 1196 32 PID 1196 wrote to memory of 2960 1196 33 PID 1196 wrote to memory of 2960 1196 33 PID 1196 wrote to memory of 2960 1196 33 PID 1196 wrote to memory of 2780 1196 34 PID 1196 wrote to memory of 2780 1196 34 PID 1196 wrote to memory of 2780 1196 34 PID 1196 wrote to memory of 2616 1196 35 PID 1196 wrote to memory of 2616 1196 35 PID 1196 wrote to memory of 2616 1196 35 PID 1196 wrote to memory of 2728 1196 36 PID 1196 wrote to memory of 2728 1196 36 PID 1196 wrote to memory of 2728 1196 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7b6baa928b733cbc9cc203c4f3a8f23_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Local\Ykl6r\dvdupgrd.exeC:\Users\Admin\AppData\Local\Ykl6r\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2796
-
C:\Windows\system32\PresentationSettings.exeC:\Windows\system32\PresentationSettings.exe1⤵PID:2960
-
C:\Users\Admin\AppData\Local\g4USVn\PresentationSettings.exeC:\Users\Admin\AppData\Local\g4USVn\PresentationSettings.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2780
-
C:\Windows\system32\VaultSysUi.exeC:\Windows\system32\VaultSysUi.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\kXfCUUH\VaultSysUi.exeC:\Users\Admin\AppData\Local\kXfCUUH\VaultSysUi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ebdd4d04339715a0628179c961a0a7d6
SHA124004f028fcdaaed5a996833194d3d366cd982cd
SHA256820ff5a12baaa2a949ad8a03d80de5281aff914089ce74765308796adb9986e5
SHA5128afab5444cc30568eb5996cffaa0bbfbd6345ed90b355a25548e73c59ea982ddb9ba05237d7a184c8f82ed56ca473f63b550e598d32e3c1d6990349669908871
-
Filesize
1.2MB
MD53d853feaa67a8bff1a85449a7170a2f2
SHA1fcf74242b2543d55710c64c1b112d657c92d7acf
SHA256c6d86920122fd78fb68a6fa109958a99b5467bead3e3fd6bf77c8e34fe7a06d6
SHA512016026237bb51e6bca8900ae86a602d081342740cad8d825c16f964a41cd5627d6cf410a864a5242c1bc49c2ecf5d62b198ba84c4b53ade8d0d64dcea8cd4efd
-
Filesize
1.2MB
MD5dd20826b131f003b9880a2e863fcd487
SHA186e9b6a91c32bfb7f77c7b8b1691c28680afb5d3
SHA2566c88c9932ebe9fd30d659f3c1e3dbf0718208a63927e3735c62af2ff6391ce08
SHA512102b164be182deae8d60dbf3e45ece18d9ffca34a8a3d354d9a97ebd0aa0d0f6696caa345ef543445a09eac708e73f82ee9d57563fd39b1bde1810a9cc8f4781
-
Filesize
1KB
MD594efb6058581b4d648df44f76b06a6cd
SHA10dee1838ac16a80a4500b9ce84e400fc0cb5cc8f
SHA2567762b16f3d860393d83e1dfbee9972e6c7520edca650b0273b755b205d5ef0cb
SHA512c3e797bfb5922408fe2c806c5fedf663f7d9e49e681f37c3bb1eaa6e72bb256d4dee296a191dd7cbd25d6c832d3e9c7268b433b5ed9eea1924bac17572c9ec2b
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
Filesize
172KB
MD5a6f8d318f6041334889481b472000081
SHA1b8cf08ec17b30c8811f2514246fcdff62731dd58
SHA256208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258
SHA51260f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69
-
Filesize
39KB
MD5f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1