Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
d6b9fdcac2da2a9cb9fe03e8634b03d3_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d6b9fdcac2da2a9cb9fe03e8634b03d3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d6b9fdcac2da2a9cb9fe03e8634b03d3
-
SHA1
30f5b61c52d0ee263890edad76b0c4419a489b26
-
SHA256
9ba56ae49d371b3a11923736585155a6fbfb169691d7740b2962c7ed2c60e026
-
SHA512
69d9e6dc9ed6217b1a3ced3660471dcb5549da9635ccd6ae5d4314b91bbe4c75cb1a1e2db0f5a4f5d5bd2380a1d45a44a1f88bd5a5637e3bfb4b6e08975950cf
-
SSDEEP
24576:7uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:l9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1192-5-0x0000000002AE0000-0x0000000002AE1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
cmstp.exeUI0Detect.exesethc.exepid process 3008 cmstp.exe 2204 UI0Detect.exe 628 sethc.exe -
Loads dropped DLL 7 IoCs
Processes:
cmstp.exeUI0Detect.exesethc.exepid process 1192 3008 cmstp.exe 1192 2204 UI0Detect.exe 1192 628 sethc.exe 1192 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Recent\\EXHv1j\\UI0Detect.exe" -
Processes:
rundll32.execmstp.exeUI0Detect.exesethc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2400 rundll32.exe 2400 rundll32.exe 2400 rundll32.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1192 wrote to memory of 1660 1192 cmstp.exe PID 1192 wrote to memory of 1660 1192 cmstp.exe PID 1192 wrote to memory of 1660 1192 cmstp.exe PID 1192 wrote to memory of 3008 1192 cmstp.exe PID 1192 wrote to memory of 3008 1192 cmstp.exe PID 1192 wrote to memory of 3008 1192 cmstp.exe PID 1192 wrote to memory of 2460 1192 UI0Detect.exe PID 1192 wrote to memory of 2460 1192 UI0Detect.exe PID 1192 wrote to memory of 2460 1192 UI0Detect.exe PID 1192 wrote to memory of 2204 1192 UI0Detect.exe PID 1192 wrote to memory of 2204 1192 UI0Detect.exe PID 1192 wrote to memory of 2204 1192 UI0Detect.exe PID 1192 wrote to memory of 2012 1192 sethc.exe PID 1192 wrote to memory of 2012 1192 sethc.exe PID 1192 wrote to memory of 2012 1192 sethc.exe PID 1192 wrote to memory of 628 1192 sethc.exe PID 1192 wrote to memory of 628 1192 sethc.exe PID 1192 wrote to memory of 628 1192 sethc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6b9fdcac2da2a9cb9fe03e8634b03d3_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:1660
-
C:\Users\Admin\AppData\Local\JkxQZ\cmstp.exeC:\Users\Admin\AppData\Local\JkxQZ\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3008
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:2460
-
C:\Users\Admin\AppData\Local\38yBmf\UI0Detect.exeC:\Users\Admin\AppData\Local\38yBmf\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2204
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:2012
-
C:\Users\Admin\AppData\Local\b1R\sethc.exeC:\Users\Admin\AppData\Local\b1R\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
Filesize
993B
MD5abb35a854e92ab84f3a2b80ca8f5dfdc
SHA14ffe4ea155597ee388f6dfaedc4868cfaf34aa8d
SHA25668aa8b4cef93a2c0ccd51d756e5ad427fce92620acd3f776fe4c25caade79338
SHA512d156c1632db6bf3bfaa9d7dfe985bde73cd9a7223a491b30f87c4d74bb0aa361d074440cd82176b2ecff7b61fd04140917e383f804ac402a52724cccf8a9bd4c
-
Filesize
1.2MB
MD517a48b7c3e23237b17a89c85cd94fe16
SHA12fbe2884becf6df51d6f4901684b851a5e790960
SHA2566280f012fb2f0484914c32598a77bb5f2872cfc37001546c96367218c52cc11b
SHA512231f1240a1a147a046771c894089ca240e0ebafe7de1b4ab90399b870a3c29def6747aa288151278b78e919e1624bfe312e937db5c6945d74839325aebcf0b76
-
Filesize
1.2MB
MD51973e39b9812bfc58dcb8a125911ffa0
SHA14227a87e06f5c1e749b93acafba6e97ef389aa04
SHA256588c9ed8ad74ff9d2c7d288a49d9a742dad9d40e196d872eab0634e85824865e
SHA5125ce9223f476f4a4cc44e8f26ad752e9df8d1bfb2833c47ec34976234e7e7f064d38876bd22750b5df87acf77dc4fcd08cc764d089d4e84ef25dbdfab2c2ef4d9
-
Filesize
1.2MB
MD58f698d54f8bd5585382151f4a4f93da4
SHA1b223c35ed6c29968c43cde8fea9c66ec1e80b445
SHA256c5a827f4a6e0a6b69b8b3f2fdbe0c1634360cfdcf772d1a5807173269afde0e7
SHA5121e69f92dee9791d1d2bb9692cb0dc6146e4a9a3e8941945a02cfb9b8b110ffa69232658bb6e4374ad969461cf784bf369ab316f6f8a690799b9baa0f03649004