Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
dbb016d718263e81da2ebf373f3f4f89_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dbb016d718263e81da2ebf373f3f4f89_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
dbb016d718263e81da2ebf373f3f4f89
-
SHA1
8e2717cb4a7925963cbbc31ef7601ca42596474a
-
SHA256
2062fc2f0bab8aafd218ac4a32fe9800beed5f260675fff153d838dd2e4cbe3a
-
SHA512
5176707394139ab0b29e06db3898b79364e88a6db95be18ac4607346aa241854f5280669810a14d858abf764414eb345b178a2877146ddb100df6b1837dd1fb4
-
SSDEEP
24576:7VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8R2:7V8hf6STw1ZlQauvzSq01ICe6zvmh
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-5-0x0000000002D40000-0x0000000002D41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SoundRecorder.exejavaws.exedwm.exepid Process 2168 SoundRecorder.exe 984 javaws.exe 1720 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
SoundRecorder.exejavaws.exedwm.exepid Process 1188 2168 SoundRecorder.exe 1188 984 javaws.exe 1188 1720 dwm.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\AddIns\\wFIXn\\javaws.exe" -
Processes:
dwm.exerundll32.exeSoundRecorder.exejavaws.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA javaws.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1188 wrote to memory of 2904 1188 30 PID 1188 wrote to memory of 2904 1188 30 PID 1188 wrote to memory of 2904 1188 30 PID 1188 wrote to memory of 2168 1188 31 PID 1188 wrote to memory of 2168 1188 31 PID 1188 wrote to memory of 2168 1188 31 PID 1188 wrote to memory of 572 1188 33 PID 1188 wrote to memory of 572 1188 33 PID 1188 wrote to memory of 572 1188 33 PID 1188 wrote to memory of 984 1188 34 PID 1188 wrote to memory of 984 1188 34 PID 1188 wrote to memory of 984 1188 34 PID 1188 wrote to memory of 2940 1188 35 PID 1188 wrote to memory of 2940 1188 35 PID 1188 wrote to memory of 2940 1188 35 PID 1188 wrote to memory of 1720 1188 36 PID 1188 wrote to memory of 1720 1188 36 PID 1188 wrote to memory of 1720 1188 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbb016d718263e81da2ebf373f3f4f89_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵PID:2904
-
C:\Users\Admin\AppData\Local\5Lwt3tld\SoundRecorder.exeC:\Users\Admin\AppData\Local\5Lwt3tld\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2168
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:572
-
C:\Users\Admin\AppData\Local\feXtOc5PH\javaws.exeC:\Users\Admin\AppData\Local\feXtOc5PH\javaws.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:984
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\0g9rz\dwm.exeC:\Users\Admin\AppData\Local\0g9rz\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5949e8b220d8b72e96fed7c32dcdcbf11
SHA13496f466dca88ce69a19402eccceb8c0b1bf4367
SHA25677c828b191ab7424d8684e34286b12f32d30d36dc2340f6b5c5f18250b83083f
SHA512724348c56808069b7d120c8ddfe8beceb0f2a1f885c93f1f61f74024b69732bcf826c311d679aac884aa3d04530b2c33f0858fb99834a2a82a585d7615e6a24d
-
Filesize
1.2MB
MD55b507973c6cc5cfc8fd1d423e02b503b
SHA1a2f0237941a1e313f1685c52d08739ca4a618664
SHA256795c093055bfc11dfbb0b65239907c578d07d210b802ff9a031413982c5ba491
SHA512e598497c5042162762306ffb1a733cd3bc827f3f9b2eec8676038cb2adf68a22baf94a787ca395ed15302f6cdbbb0168ac189b8381ea6db8624a536b7c2f94e4
-
Filesize
1.2MB
MD5526fe2c84196979aa1fbd136f7044c78
SHA12593d9456c85e2c9105658823e20c1145cbf7eaa
SHA256ba4c9649024878b1771580317bd86a52668c6859c2db6b40d80699efa9e45805
SHA5123c872c61e230abc5fb4f53b3742c23440a72af38e263b5db9b14b4d586d8e6d58aa12874cc680d9bd5e21f60942a4f1e85a1f7f1cd51b3b51bf1be679fa0e9a0
-
Filesize
1KB
MD5223d80462585578f2348742a67750470
SHA1f5a417a22cbf07fa823eb8aa376e91ffa8eb853d
SHA256031b6fec7eef2e183ba1a5c1d2fc0ab1d5f7acf7ab56ff007b3d1d591ce585bc
SHA5129532ef7c43f78ddbfa38a36d08ec0a4405b819ac6c696915bf4c8cfdd958bbcddce663d89e8b11c244cb94d0ac0adb9dedf24319e6989d31ebe563a3da024f1d
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d
-
Filesize
312KB
MD5f94bc1a70c942621c4279236df284e04
SHA18f46d89c7db415a7f48ccd638963028f63df4e4f
SHA256be9f8986a6c86d9f77978105d48b59eebfec3b9732dbf19e0f3d48bf7f20120c
SHA51260edf20ca3cae9802263446af266568d0b5e0692eddcfcfc3b2f9a39327b3184613ca994460b919d17a6edc5936b4da16d9033f5138bcfd9bc0f09d88c8dcd52