Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
c92e3efca093f668248b1296266083b3_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c92e3efca093f668248b1296266083b3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c92e3efca093f668248b1296266083b3
-
SHA1
3517fccb614a9acae54875fde47e75835f4c88ab
-
SHA256
e19ce29247123b0510e9008cfc58ebfc1f044a10d788b56ed1aaec774735d9db
-
SHA512
32b944dfd3c52e2b742ca82e14ebca4c7a2e441cb8f86ca9808f9d40b9f757afd4ea651291cabf0ed62beb646c092f3c553c8b5789b09207aa01561fe2af1455
-
SSDEEP
24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1412-5-0x0000000002700000-0x0000000002701000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sethc.exedialer.exepsr.exepid Process 364 sethc.exe 2964 dialer.exe 1340 psr.exe -
Loads dropped DLL 7 IoCs
Processes:
sethc.exedialer.exepsr.exepid Process 1412 364 sethc.exe 1412 2964 dialer.exe 1412 1340 psr.exe 1412 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Madzpveq = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Word\\AMq\\dialer.exe" -
Processes:
dialer.exepsr.exesethc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid Process 2728 regsvr32.exe 2728 regsvr32.exe 2728 regsvr32.exe 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 1412 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1412 wrote to memory of 1052 1412 30 PID 1412 wrote to memory of 1052 1412 30 PID 1412 wrote to memory of 1052 1412 30 PID 1412 wrote to memory of 364 1412 31 PID 1412 wrote to memory of 364 1412 31 PID 1412 wrote to memory of 364 1412 31 PID 1412 wrote to memory of 2136 1412 32 PID 1412 wrote to memory of 2136 1412 32 PID 1412 wrote to memory of 2136 1412 32 PID 1412 wrote to memory of 2964 1412 33 PID 1412 wrote to memory of 2964 1412 33 PID 1412 wrote to memory of 2964 1412 33 PID 1412 wrote to memory of 2420 1412 34 PID 1412 wrote to memory of 2420 1412 34 PID 1412 wrote to memory of 2420 1412 34 PID 1412 wrote to memory of 1340 1412 35 PID 1412 wrote to memory of 1340 1412 35 PID 1412 wrote to memory of 1340 1412 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c92e3efca093f668248b1296266083b3_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:1052
-
C:\Users\Admin\AppData\Local\f1AuN\sethc.exeC:\Users\Admin\AppData\Local\f1AuN\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:364
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:2136
-
C:\Users\Admin\AppData\Local\GYIOUh\dialer.exeC:\Users\Admin\AppData\Local\GYIOUh\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2964
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2420
-
C:\Users\Admin\AppData\Local\MxEfiO6\psr.exeC:\Users\Admin\AppData\Local\MxEfiO6\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50391f16b8d59de6fbb2fedd59c01f5e9
SHA1cad2d855c0b4379bdfe18a243d3d425e4d02a123
SHA256d05d727ce49c49a9a400a403cb5da18b79bb7d20ea28d72ffaadf198d27d479a
SHA5128f10fa38abd31b31d5b17de60db02552c9bed65193977b1b2973e0a7b9fe596d29e45492eefb7eb650ee45d54e24d219f5c882366f423e288d11fc83d5d2bbf6
-
Filesize
34KB
MD546523e17ee0f6837746924eda7e9bac9
SHA1d6b2a9cc6bd3588fa9804ada5197afda6a9e034b
SHA25623d8a6a1d847a324c556c30e10c8f63c2004aeb42ac3f5a5ca362077f1517382
SHA512c7117c3778650864e685bd89df599d7cdd9319d757344ddc7cfd9403d6673964127f6ff0c5ac48455fd3097af31a6ff09173f85dfa7be2d25f395cdf3692bb9a
-
Filesize
1.2MB
MD54af239ea040c2c37346cef43adc70955
SHA110b107e56f05b35fccb405c2af1708f4e83d684c
SHA256ef570391308d055f75053fd1161d8c4defebc1fa4bfb04f02325ae86d8ddf78b
SHA5125a939d71463b078c2ce25ad46376da1899d8e55c60f28ee3ddb6222d360489ee092a2ed95d173dee52037386d7e57ce88da90b4f6e9bc9796efc69190a080097
-
Filesize
1.2MB
MD5134946aca336f46d6e097152d8bb2f84
SHA1e163ddfc25115429f58affb022659f0bbc2acdff
SHA2567d3145e5d49828449160a763e54d23303883aa896b8e2f34426f2aaf9f88a0d7
SHA5125ce554ecb50f683a8d88991e69e4e7578c8c20e295b09070c1e0b9e9ed99dbddef035827e158e1298385b4987a5373c4cd280f52d8d03b0faf413f1bf59ca2c4
-
Filesize
984B
MD552708d8418d9512bf9ce9502cccca1bf
SHA131920b7f6a3fa77b4eb31549730b125681dbff24
SHA2567801ba9c39262ac5447287d97f430897f65034a4fbc880a99fc583ff2afddb64
SHA5124e5827751355bd4d9b5cdd78c0b4837058d2cf444c9647570644957122b05eec19a5d32c51403dff8dbe62b8e547cfb69e38e449add7dad38330adf942e3056a
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df