Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
d3f216eeea37381852976689b9c537a8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f216eeea37381852976689b9c537a8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d3f216eeea37381852976689b9c537a8_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d3f216eeea37381852976689b9c537a8
-
SHA1
ba8d8d6b2319e53f8b58cf84376e15b214516aa4
-
SHA256
28fb620bc8c98c777202e2c78138149132c9f237f75832028a3c01fd3009398d
-
SHA512
ae12c4bbccd60faed5544f406f80c7be37a2aef001dd33d26069bea60d95a78b7c5807d188bcbc92e6ddbcff04584006c5a54013073dafadb0b3b9286966cb0c
-
SSDEEP
24576:/uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NN:B9cKrUqZWLAcUV
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-5-0x0000000002510000-0x0000000002511000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
MpSigStub.exejavaws.exeSystemPropertiesPerformance.exepid Process 2648 MpSigStub.exe 3068 javaws.exe 1688 SystemPropertiesPerformance.exe -
Loads dropped DLL 7 IoCs
Processes:
MpSigStub.exejavaws.exeSystemPropertiesPerformance.exepid Process 1200 2648 MpSigStub.exe 1200 3068 javaws.exe 1200 1688 SystemPropertiesPerformance.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\08NTU\\javaws.exe" -
Processes:
rundll32.exeMpSigStub.exejavaws.exeSystemPropertiesPerformance.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1200 wrote to memory of 2636 1200 30 PID 1200 wrote to memory of 2636 1200 30 PID 1200 wrote to memory of 2636 1200 30 PID 1200 wrote to memory of 2648 1200 31 PID 1200 wrote to memory of 2648 1200 31 PID 1200 wrote to memory of 2648 1200 31 PID 1200 wrote to memory of 2668 1200 32 PID 1200 wrote to memory of 2668 1200 32 PID 1200 wrote to memory of 2668 1200 32 PID 1200 wrote to memory of 3068 1200 33 PID 1200 wrote to memory of 3068 1200 33 PID 1200 wrote to memory of 3068 1200 33 PID 1200 wrote to memory of 1288 1200 34 PID 1200 wrote to memory of 1288 1200 34 PID 1200 wrote to memory of 1288 1200 34 PID 1200 wrote to memory of 1688 1200 35 PID 1200 wrote to memory of 1688 1200 35 PID 1200 wrote to memory of 1688 1200 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3f216eeea37381852976689b9c537a8_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:2636
-
C:\Users\Admin\AppData\Local\JzG\MpSigStub.exeC:\Users\Admin\AppData\Local\JzG\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2648
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2668
-
C:\Users\Admin\AppData\Local\7hg4KKQL\javaws.exeC:\Users\Admin\AppData\Local\7hg4KKQL\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3068
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Ml9F\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\Ml9F\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d77e3a826a93a9a598c5df94ee8f5e08
SHA1ccc41fb513484d838491ea00dbfbb5e41dd3f30b
SHA256397e2c01b950e10733821452124eb4b18a480077899c497dbbdf67d22877e8f4
SHA512f535129d7e6a09f5c2da30fce66983ed90dab9c7588c0020a5c53fffde612f24090dfe6c0321280200559312f1156762bc3fe89b5845cc360d21dbca8bd08e8a
-
Filesize
1.2MB
MD5c5a085c510884e2d85747d45445fed3e
SHA16566d0286d3575feee261c7d8412d8d26580aef7
SHA256008bdfa3b99fc38cdab61267308f1e1b1fcb96e26f95914fb5440906e8ea54bf
SHA512a541d30f60849491b990c278918be4ea993db352048c4768bb25f5492f4acebc7878b913d10385638fadcef84aa364ec1f6f2cba44ca7fbb3011508e6e39ea95
-
Filesize
1.2MB
MD596436dc4312f5a1f6c525fb74c7f7f54
SHA10dca4d465787203b24fc9e58366a1fa5ab3aa675
SHA2566e8b0a0b472a62323a0a606672ec401ddf8d6108ddbd1cf281e3e78942be6686
SHA512d681ab63b934f6afe41e09ceb6ca388c7fc935667b45b9102feb840b3189eb4e56e49b11e4971b57345e693c1c5970cda99fb6b11903b8a0fe9a8c3a10028693
-
Filesize
815B
MD50bf6cf8391736db2b29cc51b7670ae4d
SHA1fa70968f3e65e95068bdab5cb86c44dd1a09b4ef
SHA25618ef5f051f7541c136cc666a2f4127f4bb5f84210152aa963d4111fd00bcadd4
SHA512ad0b1c6d8ad9fc01fda68b618f52c4574d3ec003ffdd9653f8341d6c13798b310d8f2fb35a7331bbc3c08a1de508fa16d8babeb148a49f2459312db69f628b8d
-
Filesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52
-
Filesize
264KB
MD52e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72