Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
d2653bc52ac82fd57843f88b6cfb3cdb_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d2653bc52ac82fd57843f88b6cfb3cdb_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
d2653bc52ac82fd57843f88b6cfb3cdb
-
SHA1
27bdf0d4fa3e6088ab7a45849f826c125690ae08
-
SHA256
32b3250666fa89539a9e89b14b35032a0d496166592382d3cda4685c42a08aee
-
SHA512
24ce2014a7d984eacb7908f4eea16ec2a9edf35fe1e126005c71b5421efed6260bcd51f49aae50e151932c906bd1571e3e457d8a1cd340824d2a13013fea8364
-
SSDEEP
24576:0uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9Np:s9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1372-5-0x0000000002710000-0x0000000002711000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2716 unregmp2.exe 1712 AdapterTroubleshooter.exe 2680 rdpclip.exe -
Loads dropped DLL 7 IoCs
pid Process 1372 Process not Found 2716 unregmp2.exe 1372 Process not Found 1712 AdapterTroubleshooter.exe 1372 Process not Found 2680 rdpclip.exe 1372 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Orgemlwcbffgzj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\FJNWOL~1\\ADAPTE~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdapterTroubleshooter.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2656 1372 Process not Found 30 PID 1372 wrote to memory of 2656 1372 Process not Found 30 PID 1372 wrote to memory of 2656 1372 Process not Found 30 PID 1372 wrote to memory of 2716 1372 Process not Found 31 PID 1372 wrote to memory of 2716 1372 Process not Found 31 PID 1372 wrote to memory of 2716 1372 Process not Found 31 PID 1372 wrote to memory of 1992 1372 Process not Found 32 PID 1372 wrote to memory of 1992 1372 Process not Found 32 PID 1372 wrote to memory of 1992 1372 Process not Found 32 PID 1372 wrote to memory of 1712 1372 Process not Found 33 PID 1372 wrote to memory of 1712 1372 Process not Found 33 PID 1372 wrote to memory of 1712 1372 Process not Found 33 PID 1372 wrote to memory of 2096 1372 Process not Found 34 PID 1372 wrote to memory of 2096 1372 Process not Found 34 PID 1372 wrote to memory of 2096 1372 Process not Found 34 PID 1372 wrote to memory of 2680 1372 Process not Found 35 PID 1372 wrote to memory of 2680 1372 Process not Found 35 PID 1372 wrote to memory of 2680 1372 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2653bc52ac82fd57843f88b6cfb3cdb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\DPVvRGZb\unregmp2.exeC:\Users\Admin\AppData\Local\DPVvRGZb\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2716
-
C:\Windows\system32\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe1⤵PID:1992
-
C:\Users\Admin\AppData\Local\XJ1\AdapterTroubleshooter.exeC:\Users\Admin\AppData\Local\XJ1\AdapterTroubleshooter.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1712
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2096
-
C:\Users\Admin\AppData\Local\IQY7O\rdpclip.exeC:\Users\Admin\AppData\Local\IQY7O\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD589eb2742559a09d2ad998d25eb3e49ad
SHA11694374e593439648011b2a4f05dc424cdd99bb5
SHA256889c49961386febc42ce95c93a6064c38b8803093cb8533449eca2d043ff8e0d
SHA5125df3f9d80a0f77488bc87941ec062d6787a98078317503d11c1f71eac7f8c8a164bf4f9c8c69ab22fab5710f49a01c5f13012b6f1405c9bafff5f67ce2133656
-
Filesize
39KB
MD5d4170c9ff5b2f85b0ce0246033d26919
SHA1a76118e8775e16237cf00f2fb79718be0dc84db1
SHA256d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da
SHA5129c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608
-
Filesize
1.4MB
MD5b3be39ccc92bc4200bfb7d83daad5905
SHA151a47f9353841c5a6d8cfb46e5b3ecc674ae98c0
SHA256c6180d80a9e4d1a0a044f084e92725c21d799948061bd5cbf21b071b08241150
SHA51203d6b37919ff7246fd55321c6d35265b2c2c0f521cb0f217a6688f75084cf277c11d83d9b2f430656ef3922ed8c51d995b8c70748ff5cd9eea4161858a733b08
-
Filesize
1KB
MD57b702281b6dbee6d64225bdfa9145c26
SHA14f8ac091e3dce6cdad27298eb985657e92ff74a3
SHA256646fe10a873c2f9fecbd3f7c7c2fc1cbeaa978c9e82ae68816e6c3c32d70acde
SHA51264c37957d28dcae47e593bfdba081cb94d600727b5453a4f9d5e937a54e939d57b87b10270cd8248348e3cfee42398bb4c189b2fad10664902e3da72e312f1cc
-
Filesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
Filesize
1.4MB
MD51e6b18a833113ceb4b67df2d2f3c7211
SHA1c9f2cfaaf74b366fcba5f7bd73c901f4face360c
SHA25647851c9a5a8b67642ec86793ab8355f68b03446dfd5d60d4a4daa8b9306491f6
SHA512e1dcc2da7b3f54658e602322520ca78bdf29cf6774789a0dcf95d8af020e0705dc164d98d04498fa19a1cb57cee9915ec13bad63ae8f6e8246486974f64007a4
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b