Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
c835b2a733959689b55c54ba276ff260_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
c835b2a733959689b55c54ba276ff260_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c835b2a733959689b55c54ba276ff260
-
SHA1
0bae1085ddd3c19f28ffa22854a1963a2f9d5750
-
SHA256
38342eb9d98ddd4a2bdc2223fb97471c186123a5f675d7c2f3291bb84e9d9f3b
-
SHA512
eadce97a5fc89ff16e63ecd33fe41b39fbf1cc9f96626a536815fa1048b367893dcc3108ff137b439fef7d5ad693c56420ca0b4b17249a9d0f3a39e407a6c5bb
-
SSDEEP
24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N/t:m9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1220-5-0x0000000002B00000-0x0000000002B01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dialer.exeRDVGHelper.exemsdt.exepid Process 2852 dialer.exe 1272 RDVGHelper.exe 2760 msdt.exe -
Loads dropped DLL 7 IoCs
Processes:
dialer.exeRDVGHelper.exemsdt.exepid Process 1220 2852 dialer.exe 1220 1272 RDVGHelper.exe 1220 2760 msdt.exe 1220 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\MEDIAC~1\\Q6l\\RDVGHE~1.EXE" -
Processes:
msdt.exerundll32.exedialer.exeRDVGHelper.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1220 wrote to memory of 2776 1220 30 PID 1220 wrote to memory of 2776 1220 30 PID 1220 wrote to memory of 2776 1220 30 PID 1220 wrote to memory of 2852 1220 31 PID 1220 wrote to memory of 2852 1220 31 PID 1220 wrote to memory of 2852 1220 31 PID 1220 wrote to memory of 2928 1220 32 PID 1220 wrote to memory of 2928 1220 32 PID 1220 wrote to memory of 2928 1220 32 PID 1220 wrote to memory of 1272 1220 33 PID 1220 wrote to memory of 1272 1220 33 PID 1220 wrote to memory of 1272 1220 33 PID 1220 wrote to memory of 2604 1220 34 PID 1220 wrote to memory of 2604 1220 34 PID 1220 wrote to memory of 2604 1220 34 PID 1220 wrote to memory of 2760 1220 35 PID 1220 wrote to memory of 2760 1220 35 PID 1220 wrote to memory of 2760 1220 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c835b2a733959689b55c54ba276ff260_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:2776
-
C:\Users\Admin\AppData\Local\a8h6e4hwo\dialer.exeC:\Users\Admin\AppData\Local\a8h6e4hwo\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2852
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2928
-
C:\Users\Admin\AppData\Local\mN8lTz\RDVGHelper.exeC:\Users\Admin\AppData\Local\mN8lTz\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1272
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\VY3s0n\msdt.exeC:\Users\Admin\AppData\Local\VY3s0n\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52151586eebecd2a5f6689a43406395fc
SHA18b1456c12e2dd4e5ebeb1f0e7d3ed86e2684ce2a
SHA256bbc200b0fdd321032d039ebd5351a2687714d4d955335415ac48ab7db449e85f
SHA51207e1f9626a462174dc9bd17acb018f76b7d773fc0b7cbadef6afa5d2a9e1f7675e4b8d07f6056bd5e5213810715cde88e828a67b4417ce7ec88e693ead95d12d
-
Filesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
Filesize
1.2MB
MD50b0abd80bfb9df290017a7b2435610bd
SHA1bc2e9b235eafa40a9f164717a1c450ce6a161598
SHA256514cf3cb6fb8852f43a9c78e06940723d76a69d3adf1ddf9494e80de68e016da
SHA5120d8d2e65e21f9a2065141ca0fb5793e17d0eba06be4240015bd11745a1f19a4359f350ac01df032fe26d78ea6991988814940f7445b6964c385242d382904d17
-
Filesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
Filesize
1.2MB
MD5c6b803bf514f6a8c3b5b73c5b4d24c72
SHA178798511a57e7847033e5241b317f49f41510f33
SHA25601798ffdd676d57da7f242d062216b4f01e18ccae4cd8ffd6acfc7a765f0d7dd
SHA51209410a5bf200efbcf7e363df49324c752e27677f4c811cb5c64c7e16c5adb28504d9151fbb98bf6d0b7ccf136ba8afd6a0cc6d96edd807623e497c2aec579785
-
Filesize
1010B
MD552584ffd74cf293132dac62ae2d37b4c
SHA170e4217bac113a3155884da17e574f35af71c818
SHA2566e45185fd760fd6ca1d45b71aaeaf1f017d5e4b30401be87bb6ca370bd2ccb3d
SHA512688eaf577bff63d1d8794c6e995c583ba3d5924bc9fe212a12e2f6799a5c61c6251a494bf28bed0c378ad6fdfd288b1c60b14faf93efde455675444b66a99840