Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
dcea7f27744c02429fdf1c007ad07bb0_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dcea7f27744c02429fdf1c007ad07bb0_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
dcea7f27744c02429fdf1c007ad07bb0
-
SHA1
5ae352c4ae07d6327ceee302739a5ebe5ce12c81
-
SHA256
05d450ee3454e6ca1e2b3d3adc4cf104b85d39bf4d219daa7951b2ff7d834b97
-
SHA512
0a751a9187dd67c7cc3ac068737f95892bee0e67024f51d5e5041b932fb965be99cd88a73507677b5a920b375c89843741d65ce918b83c06b59e6235c1246961
-
SSDEEP
24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N7t:m9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1236-5-0x0000000002ED0000-0x0000000002ED1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
perfmon.exefveprompt.exeSystemPropertiesPerformance.exepid Process 3016 perfmon.exe 2528 fveprompt.exe 2756 SystemPropertiesPerformance.exe -
Loads dropped DLL 7 IoCs
Processes:
perfmon.exefveprompt.exeSystemPropertiesPerformance.exepid Process 1236 3016 perfmon.exe 1236 2528 fveprompt.exe 1236 2756 SystemPropertiesPerformance.exe 1236 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wtobeyey = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\MjkfRjdi3ML\\fveprompt.exe" -
Processes:
rundll32.exeperfmon.exefveprompt.exeSystemPropertiesPerformance.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1236 wrote to memory of 2604 1236 30 PID 1236 wrote to memory of 2604 1236 30 PID 1236 wrote to memory of 2604 1236 30 PID 1236 wrote to memory of 3016 1236 31 PID 1236 wrote to memory of 3016 1236 31 PID 1236 wrote to memory of 3016 1236 31 PID 1236 wrote to memory of 992 1236 32 PID 1236 wrote to memory of 992 1236 32 PID 1236 wrote to memory of 992 1236 32 PID 1236 wrote to memory of 2528 1236 33 PID 1236 wrote to memory of 2528 1236 33 PID 1236 wrote to memory of 2528 1236 33 PID 1236 wrote to memory of 2532 1236 34 PID 1236 wrote to memory of 2532 1236 34 PID 1236 wrote to memory of 2532 1236 34 PID 1236 wrote to memory of 2756 1236 35 PID 1236 wrote to memory of 2756 1236 35 PID 1236 wrote to memory of 2756 1236 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcea7f27744c02429fdf1c007ad07bb0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:880
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\DOgoS8O2g\perfmon.exeC:\Users\Admin\AppData\Local\DOgoS8O2g\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3016
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:992
-
C:\Users\Admin\AppData\Local\yImoL\fveprompt.exeC:\Users\Admin\AppData\Local\yImoL\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2528
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:2532
-
C:\Users\Admin\AppData\Local\6fCP\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\6fCP\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5f12d22192ab3cb06b729ef74d55982de
SHA114d80c2cbe696d944ca8f1614d3f0f28c32270cf
SHA256fcbfaabc8e00a6c7ea3179d86484211c72cf9fec2b55385a16c31c7b5964ad28
SHA512393e61b06be696f2c6de48fa4bf2116275a3fa6f1ca3a4cfb5b78eb2b1678533ee72521d0f344e364455883481fa48becb975cce9022970c391e9e40171e5656
-
Filesize
1.2MB
MD5f67b6c50ef1723f9a210d46c8b1c1127
SHA1007e2e20a50d1ae7771539032e3a93e1227aacc6
SHA256aaf57e92797cecaeda48fdebd60890227f7297a905925a1fd71823627ae5e3d0
SHA51286819a36fd529a495778a46afcc2a71957bc00def1e18b97a19b31a66f830a5bb9784fc99a5594e516773dec15a8afc09fe23d7a77be7f4d8a0e0def84ce1aa6
-
Filesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
Filesize
1.2MB
MD5c53764d7d944ee93df3b73887752d520
SHA1d4ddc8c60b2a5172398a2fbc317a98b1fc12feb3
SHA25689fe464e84404e7543759cef780de3efe1ac914c226cc0acfef81c8d53ea3281
SHA512f6067609f32bf04c474ec810fa05bb893d23cfef4ce649ca602a82722b89a973e0979cac084338edcf7ffa2308aa3426c4139d59603252e0e876295fdd384c0b
-
Filesize
1KB
MD58d6cebfe690d64a24d387230e0bbf187
SHA1880751157769dd116e5fec13d5e6515b44fcadf6
SHA25635066b5dc812712366e2f0008b6719c9143ddefeb3405931ea348af5336df219
SHA512745b7ce15b9008d3289e3f527681b7507cf973b6591a970f0f56deb4400f399dc52a02e65b5643cfb5a57ae6ebad1260eb4429900b9005f1bbe3ff77078e7bf4
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc