Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
d29a9bff7a76be99fb115fbc9c46ab19_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d29a9bff7a76be99fb115fbc9c46ab19_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d29a9bff7a76be99fb115fbc9c46ab19_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d29a9bff7a76be99fb115fbc9c46ab19
-
SHA1
77923c1d6eb58ada0eba8ac9f95a6b6eeae99dd6
-
SHA256
6c81b737c65a78dd31564f648152c40c15a1dacfab48130f46f5168f9526691f
-
SHA512
cd7d1779641120ccd7f59842599b341f102bf4f5626a24b6393490c223f396945eca6bc9fca3567771fb3b5efd71b5e6290fdd1e2803aaf86ffd6be467958107
-
SSDEEP
24576:huYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N7:z9cKrUqZWLAcUj
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1168-5-0x0000000002560000-0x0000000002561000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2620 ddodiag.exe 2576 isoburn.exe 568 p2phost.exe -
Loads dropped DLL 7 IoCs
pid Process 1168 Process not Found 2620 ddodiag.exe 1168 Process not Found 2576 isoburn.exe 1168 Process not Found 568 p2phost.exe 1168 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\G3K8AC~1\\isoburn.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p2phost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 regsvr32.exe 1980 regsvr32.exe 1980 regsvr32.exe 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found 1168 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2568 1168 Process not Found 31 PID 1168 wrote to memory of 2568 1168 Process not Found 31 PID 1168 wrote to memory of 2568 1168 Process not Found 31 PID 1168 wrote to memory of 2620 1168 Process not Found 32 PID 1168 wrote to memory of 2620 1168 Process not Found 32 PID 1168 wrote to memory of 2620 1168 Process not Found 32 PID 1168 wrote to memory of 2980 1168 Process not Found 33 PID 1168 wrote to memory of 2980 1168 Process not Found 33 PID 1168 wrote to memory of 2980 1168 Process not Found 33 PID 1168 wrote to memory of 2576 1168 Process not Found 34 PID 1168 wrote to memory of 2576 1168 Process not Found 34 PID 1168 wrote to memory of 2576 1168 Process not Found 34 PID 1168 wrote to memory of 2060 1168 Process not Found 35 PID 1168 wrote to memory of 2060 1168 Process not Found 35 PID 1168 wrote to memory of 2060 1168 Process not Found 35 PID 1168 wrote to memory of 568 1168 Process not Found 36 PID 1168 wrote to memory of 568 1168 Process not Found 36 PID 1168 wrote to memory of 568 1168 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d29a9bff7a76be99fb115fbc9c46ab19_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:2568
-
C:\Users\Admin\AppData\Local\CG6eTxQoP\ddodiag.exeC:\Users\Admin\AppData\Local\CG6eTxQoP\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2620
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\6S1AMS\isoburn.exeC:\Users\Admin\AppData\Local\6S1AMS\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2576
-
C:\Windows\system32\p2phost.exeC:\Windows\system32\p2phost.exe1⤵PID:2060
-
C:\Users\Admin\AppData\Local\xYY3FEzom\p2phost.exeC:\Users\Admin\AppData\Local\xYY3FEzom\p2phost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD568b2ddbab0d753acf816b305cc670d00
SHA1f5e051ab4c10d3ac025efe6424970c3f0cb22986
SHA256a67bd1fe4151b232b12230404335d935b35970c75a5a35c4cd0d0f3c0609e861
SHA512ca050401922312ca843cd32ad5cc177b640b244d79006fbabe3d185e62d9407b35d4ea66b40fb8ff62006e8ed7f2b2ebeea57ab399bdb0c0031fa172c945fd37
-
Filesize
1.2MB
MD5664e0a06e90a5f7f8abf221efe9d4ac3
SHA1e2941b4212bb27030955ca0096df7373ee967355
SHA25655ed26d3fff40b3298d4e00c6cb5ffbc08b27435e9d09dc539936a44a7b827ec
SHA5129dd1bc3f158b19311404f6ac6a0be25339438414dcaf62742d5801c18fa3712898dba7926f5141ce8776576dc447c9cb7fe64f9373af548b5f003280d36d5950
-
Filesize
1.2MB
MD54e2247e3646c39c630bddd02f29c472b
SHA1040ece563f630418e2a4bbcaf067c4a934872b4f
SHA256c1a848fd0d28ba6f2873bb04e83f33489e6ab8aae655bfce66331e815f5256dd
SHA5125db8dbe7f9e3475af897735790bb99cf91a4d40349b234c698a70e2f9534f28fe6a0c0780682a6e59fbbd7e070260066a431fa6c8fd0b07c5d4e3a44b240499e
-
Filesize
1KB
MD5f034b226429f6420c35d2503b53266f0
SHA1c082489a3c90298ddf1ab23e285250d6c734d171
SHA25605b9c8e3f06bca95a32414547d3905a7437596d61c5b45d72d7e440ba7c88c46
SHA5122de98dfa573370eb0e16a8904e59c4b419346a94e5ac16da4fce1f65d53ecb80af010f8ed48a79109d4a9917f93937f2a9f8dd62aa12f424e6ccb44203c850f6
-
Filesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa
-
Filesize
42KB
MD5509f9513ca16ba2f2047f5227a05d1a8
SHA1fe8d63259cb9afa17da7b7b8ede4e75081071b1a
SHA256ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e
SHA512ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862
-
Filesize
172KB
MD50dbd420477352b278dfdc24f4672b79c
SHA1df446f25be33ac60371557717073249a64e04bb2
SHA2561baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345
SHA51284014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1