Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d26885945eb4456891a98cf5150c51bb
-
SHA1
2a51c4f78684aff8b1b4ee5831bc78276d7c0c02
-
SHA256
72a98167067dce07044af99248b5e58b14dcdad86d1e6e1a677014103bb08698
-
SHA512
aa8f8b39916d5ad5b0ed3fc278abb0912f899e85f333ed1772c87e104e7c5bbcda1251c2f16f4682c2b26f36228330f234264de60c8e88916c36dacecf916a76
-
SSDEEP
24576:juYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:N9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002490000-0x0000000002491000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2636 sdclt.exe 264 eudcedit.exe 2928 msdtc.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2636 sdclt.exe 1200 Process not Found 264 eudcedit.exe 1200 Process not Found 2928 msdtc.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\kAKxaLF\\eudcedit.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sdclt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 rundll32.exe 3040 rundll32.exe 3040 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2724 1200 Process not Found 31 PID 1200 wrote to memory of 2724 1200 Process not Found 31 PID 1200 wrote to memory of 2724 1200 Process not Found 31 PID 1200 wrote to memory of 2636 1200 Process not Found 32 PID 1200 wrote to memory of 2636 1200 Process not Found 32 PID 1200 wrote to memory of 2636 1200 Process not Found 32 PID 1200 wrote to memory of 1796 1200 Process not Found 33 PID 1200 wrote to memory of 1796 1200 Process not Found 33 PID 1200 wrote to memory of 1796 1200 Process not Found 33 PID 1200 wrote to memory of 264 1200 Process not Found 34 PID 1200 wrote to memory of 264 1200 Process not Found 34 PID 1200 wrote to memory of 264 1200 Process not Found 34 PID 1200 wrote to memory of 276 1200 Process not Found 35 PID 1200 wrote to memory of 276 1200 Process not Found 35 PID 1200 wrote to memory of 276 1200 Process not Found 35 PID 1200 wrote to memory of 2928 1200 Process not Found 36 PID 1200 wrote to memory of 2928 1200 Process not Found 36 PID 1200 wrote to memory of 2928 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d26885945eb4456891a98cf5150c51bb_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:2724
-
C:\Users\Admin\AppData\Local\RwSdgA5ht\sdclt.exeC:\Users\Admin\AppData\Local\RwSdgA5ht\sdclt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2636
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:1796
-
C:\Users\Admin\AppData\Local\s3OO\eudcedit.exeC:\Users\Admin\AppData\Local\s3OO\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:264
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:276
-
C:\Users\Admin\AppData\Local\HvXF\msdtc.exeC:\Users\Admin\AppData\Local\HvXF\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5aa48a03ee1762ada18b8d893f0269690
SHA15d3479b5d109e5f2ee11b18094a37ddd838ff52d
SHA25698bb69e0b9e74802ac7d6367ab9fdf7e3a17643299a1af5b203b8a8de4962a4d
SHA5129f4a0b280a5decb48a8dbdc14f430a2f51630844645b47fba21a628418834af57a2efcae4587b0eff4dda2bd26c1290234e01da2749fe66c79924a2c7bf630ff
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
1.2MB
MD58a9d2d6d2fa3e4b428f3de30e06b657e
SHA1f1a137644713ffc17eae51d2e74f4d89c1e1ac7f
SHA2564566ab3ace335fcf83ab1d04058cd36d980bf26746d7d55fdf110845a295c486
SHA512c5db6997b2595ce9c95f69264f447135a116aa762df6815b1a0a1d858948367ffecc99471e96860b862cf25b98a71a73c148caf80bec889e542bdc141f157f1b
-
Filesize
1.2MB
MD548c94e29182c870f8fbb4ba4508f3253
SHA15438550b08710f549b975bc846805259399f07e1
SHA2560dbb800d939939d503d17182e4705b2aa8ce4dbf50babebb327e04e531f4d055
SHA51298a5c4b700c58a14962abacb0cd891ff3585d0a8e6f4022369a87d491187203b100e5af2f8a8776742d235be351977db149e9bb29af37ebd148d36c271ef32b8
-
Filesize
1KB
MD513b341ec4c1d0e01bebd9cf84c5419e9
SHA1600e1efd1af1e6d113493aacced345a06fd2cd33
SHA25642c71ee75e1a89241f555686deafea88f483c51df8eb75ff8dbb3d6732b6124c
SHA5124bc61fbb27a3252a8c13ac4b26b4f6be8fb6660ecb7800552941b747edb60413ea3459a08c57b290011896d59b1538cc3c8cecfb83e40e0c3e2f8b0f4b2aab77
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
351KB
MD535e397d6ca8407b86d8a7972f0c90711
SHA16b39830003906ef82442522d22b80460c03f6082
SHA2561f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde
SHA51271b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e