Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
d8cf023eb8750f452b685ed59fe62820_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d8cf023eb8750f452b685ed59fe62820_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d8cf023eb8750f452b685ed59fe62820
-
SHA1
b4be377b765f4efbee22a39d3d55bdbf0556477e
-
SHA256
cd1bd457f42d8afb53753b2e986ad3b7bfee9e0ba1bf97c3f71eda63433d77e4
-
SHA512
41c72ff1cecea5ee4f4e80d3b5b15c6da227ab0b3c1ae884717e21eb22b38fe5430cef6421cbaa092bf5f137b47a35b4c1eb7cf91cd0e116880fdb8c656ae5f0
-
SSDEEP
24576:DuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:t9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-5-0x0000000002DA0000-0x0000000002DA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
ddodiag.exerdpclip.exetabcal.exepid Process 2720 ddodiag.exe 2996 rdpclip.exe 2760 tabcal.exe -
Loads dropped DLL 7 IoCs
Processes:
ddodiag.exerdpclip.exetabcal.exepid Process 1208 2720 ddodiag.exe 1208 2996 rdpclip.exe 1208 2760 tabcal.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\hqc\\rdpclip.exe" -
Processes:
rundll32.exeddodiag.exerdpclip.exetabcal.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2328 rundll32.exe 2328 rundll32.exe 2328 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1208 wrote to memory of 1628 1208 31 PID 1208 wrote to memory of 1628 1208 31 PID 1208 wrote to memory of 1628 1208 31 PID 1208 wrote to memory of 2720 1208 32 PID 1208 wrote to memory of 2720 1208 32 PID 1208 wrote to memory of 2720 1208 32 PID 1208 wrote to memory of 2700 1208 33 PID 1208 wrote to memory of 2700 1208 33 PID 1208 wrote to memory of 2700 1208 33 PID 1208 wrote to memory of 2996 1208 34 PID 1208 wrote to memory of 2996 1208 34 PID 1208 wrote to memory of 2996 1208 34 PID 1208 wrote to memory of 2752 1208 35 PID 1208 wrote to memory of 2752 1208 35 PID 1208 wrote to memory of 2752 1208 35 PID 1208 wrote to memory of 2760 1208 36 PID 1208 wrote to memory of 2760 1208 36 PID 1208 wrote to memory of 2760 1208 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8cf023eb8750f452b685ed59fe62820_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:1628
-
C:\Users\Admin\AppData\Local\X9BT9O\ddodiag.exeC:\Users\Admin\AppData\Local\X9BT9O\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2720
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵PID:2700
-
C:\Users\Admin\AppData\Local\JxdIDFQ\rdpclip.exeC:\Users\Admin\AppData\Local\JxdIDFQ\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2996
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:2752
-
C:\Users\Admin\AppData\Local\yRas\tabcal.exeC:\Users\Admin\AppData\Local\yRas\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57d62909319c546dda20b993c47fe8e97
SHA169bf618b9a91171a953c5ae7a25fa0604363c1cf
SHA256510a50b2dfba500154597b6c7b4b6ca8db7d77231c50f4485699b6c51e86cd47
SHA512541de3e2445a76f3ef9d8c9d01a1f59e38e58ec7daf6260e984b5129b54297f6f2077f868b8991cd67ad4bfca03bc23b3a6b7f442cc59f6159431d7a544db168
-
Filesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
Filesize
1.2MB
MD5c35da47bdcad621159806b1ec9283913
SHA177f0cd7d1bb6bf6eb9325cd7a7ec6ade1de69ee6
SHA256a7ff2e6127996e287b9d8ebdf2ebbe10e0ad23af1249b201365c6d6730cc6c10
SHA5123bebd97ef5ce382fadcfb0519923cb09fa8735d6e1d2910ff718aed700b9a0fa6882777ad88a61c655375374c155dc221ce9f9a43e399ab3aea8c1ca9e9de945
-
Filesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
Filesize
1KB
MD51a357b0e561edc4c02ae4a5a727135c0
SHA13312cb6cf7a668d1871093b6d9400efa813b8fd2
SHA256b1fe59409cfcdf7a3364ea598e1023d8fe0cdc601c07de6ddf6e0a491c20a1ed
SHA51279c4d0757cc552132282dcdbac7b4a60b08174c87a291f2c07e4713ad7ffb51f6c8910cf325440d10ef69ebd0cb4681a0c454d1f3b8743ea7bda6d63d1f47307
-
Filesize
42KB
MD5509f9513ca16ba2f2047f5227a05d1a8
SHA1fe8d63259cb9afa17da7b7b8ede4e75081071b1a
SHA256ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e
SHA512ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862
-
Filesize
1.2MB
MD56f6bd171eefdb54c2fa275321da49ac9
SHA10fb2ebe80e9b81b9b93a985e16f3c73727422f11
SHA25631a464ec13e0d55b4645fb7d0869edc63a677e66a1ae278e82e06a04b49b9007
SHA51242388f26b235184f1cf19269063326987165987b9ed7a23c73ec42958339a2ac30a6a690ed741d6341c51f78521ecf6e7cdc456f6e75cfda9926f0b403cfe533