Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
e090a110c92fd8946f94056dba3191a0
-
SHA1
e4d9a011c12ba06f3afbdad94c6d65459f98d479
-
SHA256
9b35e8390d3620e3c5a99040ea4c5ad6e3ec02a165b5cf788ceec7f31a68a4a0
-
SHA512
15c822a0530564d4c16d11428d5f3afe260881b4e7db6225b650b71ed20f20629c13e4edf7fd5cf806951b7c7a9a7afee680fbdcda3b5e477b8f078ff7b1308b
-
SSDEEP
24576:CuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:K9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
eudcedit.exewscript.exeRDVGHelper.exepid process 1164 eudcedit.exe 804 wscript.exe 2124 RDVGHelper.exe -
Loads dropped DLL 8 IoCs
Processes:
eudcedit.exewscript.exeRDVGHelper.exepid process 1208 1164 eudcedit.exe 1208 1208 804 wscript.exe 1208 2124 RDVGHelper.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Neewpjodwhuy = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\{DC1210CF-B63A-446E-AF3A-F1B1B9A04067}\\SokFMz7MD9o\\wscript.exe" -
Processes:
eudcedit.exewscript.exeRDVGHelper.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2876 rundll32.exe 2876 rundll32.exe 2876 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1208 wrote to memory of 772 1208 eudcedit.exe PID 1208 wrote to memory of 772 1208 eudcedit.exe PID 1208 wrote to memory of 772 1208 eudcedit.exe PID 1208 wrote to memory of 1164 1208 eudcedit.exe PID 1208 wrote to memory of 1164 1208 eudcedit.exe PID 1208 wrote to memory of 1164 1208 eudcedit.exe PID 1208 wrote to memory of 2220 1208 wscript.exe PID 1208 wrote to memory of 2220 1208 wscript.exe PID 1208 wrote to memory of 2220 1208 wscript.exe PID 1208 wrote to memory of 804 1208 wscript.exe PID 1208 wrote to memory of 804 1208 wscript.exe PID 1208 wrote to memory of 804 1208 wscript.exe PID 1208 wrote to memory of 1988 1208 RDVGHelper.exe PID 1208 wrote to memory of 1988 1208 RDVGHelper.exe PID 1208 wrote to memory of 1988 1208 RDVGHelper.exe PID 1208 wrote to memory of 2124 1208 RDVGHelper.exe PID 1208 wrote to memory of 2124 1208 RDVGHelper.exe PID 1208 wrote to memory of 2124 1208 RDVGHelper.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e090a110c92fd8946f94056dba3191a0_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵PID:772
-
C:\Users\Admin\AppData\Local\pQG\eudcedit.exeC:\Users\Admin\AppData\Local\pQG\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1164
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2220
-
C:\Users\Admin\AppData\Local\e5a79c\wscript.exeC:\Users\Admin\AppData\Local\e5a79c\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:804
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:1988
-
C:\Users\Admin\AppData\Local\tDN\RDVGHelper.exeC:\Users\Admin\AppData\Local\tDN\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5efbaa8079c13058ecf2c384f9b1a9a5e
SHA148baa8f429afb1e12f4337dd10ad708eaee2979d
SHA256e8e86c0c9356cd8a9511e7ebcffd1c6f97f1300efb3604233ca1a5a5e1fbe220
SHA5129802a85a99d334f43df4cc6ea1f98a6bd1a04333f0ee968b169e4fef6caba6111777cfb2aee148156a14a380091a5e987b476796896f5c198d91e3037c3517f0
-
Filesize
1.4MB
MD595761a2dbe552add939e16bf8cd5a735
SHA19cf90f58539f2654522c3898526599f799e48c3c
SHA25682f860a5014161f2963f417574147a927fc08a5de2d4186b60412c5b3e367460
SHA512c08827c9c66c4576a96af0e57551b6293bccdf03bbe486783baa59752eb7db664d7362843aa8f0ca2d4d8463c35a18af8ae46f212d0b0204417799bf02eeafa5
-
Filesize
1.4MB
MD553d79077e2839b91e970815b42475c54
SHA1e60a03d239832846a5e367dffaacaa81e494f9a8
SHA25655e88a498cdc36eafd3f025455ed54aaa6aa2869827377d3d7ca1b608df4e117
SHA51285042dec885c9f51e3717037df565ec73dacadac0279eda31bb6908a0c64d7f9a043d8596284e3fcd61e0707a6f5c0986b4d16478342b9178acde8704e62750d
-
Filesize
938B
MD5370c13c77b79e06b2cea32ccc4b114eb
SHA1d7e34664a87d2fb02e5d5895562ea8e267b65cf5
SHA256bbbccbb76bca72f2d945c631e2ffc3c875be1515ae06dbaa88739ad870e66dd1
SHA51218bd3909752cbb0abfed2dbd64eff0b6ee5285a508078757b6bbadbb55b7cda1c2c5700dc95891afe6412fc66760ec2afa4f19853223b5469501808889d3df1d
-
Filesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
Filesize
351KB
MD535e397d6ca8407b86d8a7972f0c90711
SHA16b39830003906ef82442522d22b80460c03f6082
SHA2561f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde
SHA51271b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051