Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
cb97f3b10b212687f53bd9a867b48792_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
cb97f3b10b212687f53bd9a867b48792_JaffaCakes118.dll
-
Size
989KB
-
MD5
cb97f3b10b212687f53bd9a867b48792
-
SHA1
af2894245835fca466a102b9cc5269ba2e4d8cd6
-
SHA256
028d57c42088b9a1346732bb9d7d19c2324293e9e7e1d7b39e602edaa9c878de
-
SHA512
977ba2dcd9c2ebd059ebf35c9b010c45dc8d80c1b3105ee1607bd99dc663517a126a8c4a3726bacd84d5545a14c921d689537dee31b7e6db15075ffda9e2ac66
-
SSDEEP
24576:xVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:xV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1120-5-0x00000000029B0000-0x00000000029B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2816 unregmp2.exe 2508 xpsrchvw.exe 1584 FXSCOVER.exe -
Loads dropped DLL 7 IoCs
pid Process 1120 Process not Found 2816 unregmp2.exe 1120 Process not Found 2508 xpsrchvw.exe 1120 Process not Found 1584 FXSCOVER.exe 1120 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nvzakw = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\GWI7LD~1\\xpsrchvw.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2812 rundll32.exe 2812 rundll32.exe 2812 rundll32.exe 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found 1120 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2484 1120 Process not Found 30 PID 1120 wrote to memory of 2484 1120 Process not Found 30 PID 1120 wrote to memory of 2484 1120 Process not Found 30 PID 1120 wrote to memory of 2816 1120 Process not Found 31 PID 1120 wrote to memory of 2816 1120 Process not Found 31 PID 1120 wrote to memory of 2816 1120 Process not Found 31 PID 1120 wrote to memory of 2472 1120 Process not Found 32 PID 1120 wrote to memory of 2472 1120 Process not Found 32 PID 1120 wrote to memory of 2472 1120 Process not Found 32 PID 1120 wrote to memory of 2508 1120 Process not Found 33 PID 1120 wrote to memory of 2508 1120 Process not Found 33 PID 1120 wrote to memory of 2508 1120 Process not Found 33 PID 1120 wrote to memory of 2028 1120 Process not Found 34 PID 1120 wrote to memory of 2028 1120 Process not Found 34 PID 1120 wrote to memory of 2028 1120 Process not Found 34 PID 1120 wrote to memory of 1584 1120 Process not Found 35 PID 1120 wrote to memory of 1584 1120 Process not Found 35 PID 1120 wrote to memory of 1584 1120 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb97f3b10b212687f53bd9a867b48792_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:2484
-
C:\Users\Admin\AppData\Local\kBJ7pE\unregmp2.exeC:\Users\Admin\AppData\Local\kBJ7pE\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2816
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:2472
-
C:\Users\Admin\AppData\Local\x3D7rB\xpsrchvw.exeC:\Users\Admin\AppData\Local\x3D7rB\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2508
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2028
-
C:\Users\Admin\AppData\Local\2dIb\FXSCOVER.exeC:\Users\Admin\AppData\Local\2dIb\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
Filesize
991KB
MD5216e2c618be590aa686880ecffe0d5b4
SHA135d3f3a052a6270dc998212b2e72940daf79945e
SHA2565e71b0bd10cc00cf41af988a825b798705c8a8db87c97b8622294dbe23459151
SHA512b7b781b4e2f53ba724daae5c5c2814717973ab7d4c471af59e61b678fe518afe4c62a56261fd396cd5d30659a0c8ae306e2b6ac900add70ab0c0f71d9044a88c
-
Filesize
1KB
MD53532caf31680b56db245f8cf8e61d36c
SHA187ab28cedfd9dbccf4cfb45e026fd026564e1feb
SHA25618580c5bd004ffbf3b3dbd9ac4c51f51b721e4ed9d9af190261fabc36fa660bd
SHA512c5b3a064058776bd1754856df30150b88bbc49fbd1215a73d9417bea09bdfc7336a1591788471c7800a28d7a6c4c2f425e3cdfd43a945fbceca0c0f89d79bd64
-
Filesize
1017KB
MD522852259e58c8047156e15691ac2fec8
SHA131784ab30cc061f0c60fb7c53f995959eced3d0c
SHA2566bd36fd95eb94edf413f8a1731051a0b17c0dceaddc661a76a2e3699c46b9350
SHA512085d6fd80a0294a8b791867784f63dbe73d8bab44498528eb4be58457a4ee6e2a7ad43e5df1ed40d829654cd826a26fdd5bb500b6c57de583155cc4d1322f2ef
-
Filesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
Filesize
994KB
MD593ac413471ecba351173ff5f9d1f75b1
SHA1e600fbab40a08b5e1d5ee76244e51daf227fd2d2
SHA25641dc34bc535305794eaab3531bdb1ec99ed2b846d5dab4ca5191a7e238f8023a
SHA512e12a013d10e9f620850ec0d1e49f2b6ec7bef3b4a8037191bf6b2d00cf60dae5f1f9d73472933b813d0237fd0468e461f3b7f964e490d192b15db610c9d4c55e
-
Filesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835