Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
cf42baf701af133c3b5644942b098edd
-
SHA1
fa131bba515e453c67ecb025dfd4f8f2d76a01bc
-
SHA256
912ee7943db3b7e80cca61c022154f0fc13ef29ff948a89bbc87ed1b2938ac94
-
SHA512
873c88128d15175aed92577de51d2113723f00fb10358551affa4764e619707a453d25f2d3f3d5a028dfd9784cabb051916424dfde4df87aa2a0ee34beaae750
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002E70000-0x0000000002E71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesRemote.exesethc.exewbengine.exepid Process 2456 SystemPropertiesRemote.exe 2996 sethc.exe 1620 wbengine.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesRemote.exesethc.exewbengine.exepid Process 1200 2456 SystemPropertiesRemote.exe 1200 2996 sethc.exe 1200 1620 wbengine.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kffMxRiPA9\\sethc.exe" -
Processes:
SystemPropertiesRemote.exesethc.exewbengine.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2116 rundll32.exe 2116 rundll32.exe 2116 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2576 1200 31 PID 1200 wrote to memory of 2576 1200 31 PID 1200 wrote to memory of 2576 1200 31 PID 1200 wrote to memory of 2456 1200 32 PID 1200 wrote to memory of 2456 1200 32 PID 1200 wrote to memory of 2456 1200 32 PID 1200 wrote to memory of 1964 1200 33 PID 1200 wrote to memory of 1964 1200 33 PID 1200 wrote to memory of 1964 1200 33 PID 1200 wrote to memory of 2996 1200 34 PID 1200 wrote to memory of 2996 1200 34 PID 1200 wrote to memory of 2996 1200 34 PID 1200 wrote to memory of 1224 1200 35 PID 1200 wrote to memory of 1224 1200 35 PID 1200 wrote to memory of 1224 1200 35 PID 1200 wrote to memory of 1620 1200 36 PID 1200 wrote to memory of 1620 1200 36 PID 1200 wrote to memory of 1620 1200 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf42baf701af133c3b5644942b098edd_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\Y8JG9K\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\Y8JG9K\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2456
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:1964
-
C:\Users\Admin\AppData\Local\JnJxxXw\sethc.exeC:\Users\Admin\AppData\Local\JnJxxXw\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2996
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:1224
-
C:\Users\Admin\AppData\Local\KVN5UilxT\wbengine.exeC:\Users\Admin\AppData\Local\KVN5UilxT\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD503b6eaf8e13da1fe144c6e7dd899c9fc
SHA151196a58e70b60afd17b33582e90f51d80979145
SHA2567a287c004dcd762c4583af27bf589e3d831923447099a12300f06283a14f81a3
SHA512edee126835daca5fc4c0495c668193279c0cf7736e54f428f3d664c804edcccf2269c18526122d723899da990e18706797481fcaf8a3a995d9d3aff299bb146b
-
Filesize
1.2MB
MD55f9e0e9b43a2340ee2ffe9aa7bc0f0fe
SHA1810ee681d73d589b7a0b618314a370c71201b015
SHA2567014b75e3d6f33d0356b62f96d903be92575c9cefc80b4124b82b15ba89244e1
SHA5120fa329d3a68ff08f07cd0bb41ce0f15958a450b3d80af1e81f14d5da7603fc44d2454fbc5f860aa51605623954b0459ceb7e5e3420c59534d767b803f3f6d01d
-
Filesize
1.2MB
MD57b9e6552f2e19966c41698ae0c01eceb
SHA1a96789f650357364132d44e72d3861ecd03da4dd
SHA256b61ae89b58af44b10f2a702ee4118d0b64f7036e2db429041c9b02d55010ab1a
SHA512d6c6eb8054531afcae1f6abd2ee7501986ae214f1abc48187c5df9e61db50ad109207220ceab446fb48f8d800498bb5b6eae3c1ccede98ea1b8ebd3d941eef45
-
Filesize
1KB
MD5633496c9b26c37d286d145daefd8a713
SHA1408013ce85a3457e4556f83fafdebca919b115c7
SHA25625527805bab9eb24a6c3e6892b45f3713bd01094ef9ae02aff3428811da6798b
SHA512be837f41826258806ecc3c1b6f05d0f228c6ca728b47a49cce825e77e9d46c6ee1c53c347b9c558273ef8b06574d53d364d446c28777d85c391b99bf5a505db5
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
Filesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
Filesize
80KB
MD5d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7