Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
e197f60b0db3189f6af916cf489f6cb3_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e197f60b0db3189f6af916cf489f6cb3_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
e197f60b0db3189f6af916cf489f6cb3
-
SHA1
f1679a5453809d4cf2de3ea04e5cdf3aab48a0ee
-
SHA256
2556434fa80ac79faa55812f479fd1e14d0b7297d379f6935073bd5c6e25f693
-
SHA512
cf709ff4cd7671fd69d7bea310269ff44f031c5cd98fae96bc1835716d3911ab03477e7945da13083dd905e9e385f43df2d0fad56db870f0fa75b3bf58e08fce
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:F9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2676 BitLockerWizard.exe 1672 dccw.exe 2728 xpsrchvw.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2676 BitLockerWizard.exe 1200 Process not Found 1672 dccw.exe 1200 Process not Found 2728 xpsrchvw.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\eFfVFDu\\dccw.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 rundll32.exe 1864 rundll32.exe 1864 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2592 1200 Process not Found 33 PID 1200 wrote to memory of 2592 1200 Process not Found 33 PID 1200 wrote to memory of 2592 1200 Process not Found 33 PID 1200 wrote to memory of 1672 1200 Process not Found 34 PID 1200 wrote to memory of 1672 1200 Process not Found 34 PID 1200 wrote to memory of 1672 1200 Process not Found 34 PID 1200 wrote to memory of 2500 1200 Process not Found 35 PID 1200 wrote to memory of 2500 1200 Process not Found 35 PID 1200 wrote to memory of 2500 1200 Process not Found 35 PID 1200 wrote to memory of 2728 1200 Process not Found 36 PID 1200 wrote to memory of 2728 1200 Process not Found 36 PID 1200 wrote to memory of 2728 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e197f60b0db3189f6af916cf489f6cb3_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:2248
-
C:\Users\Admin\AppData\Local\PsAp\BitLockerWizard.exeC:\Users\Admin\AppData\Local\PsAp\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2676
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:2592
-
C:\Users\Admin\AppData\Local\JrVQQO7\dccw.exeC:\Users\Admin\AppData\Local\JrVQQO7\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1672
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:2500
-
C:\Users\Admin\AppData\Local\CARHv\xpsrchvw.exeC:\Users\Admin\AppData\Local\CARHv\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b66e033e29537e6e6e5152d139044076
SHA1941603b5f4374e1683d249aef882490fc8de4198
SHA256d9aa50b440a62a4367a1955d871f9d5608796e247aa08e6669d61c685de359a7
SHA512a3f4b09c12eac523d1bb7c54c1befcfc8dbdfa74c2ba1f73b5469111631461dc928d8b508edbb9b6bd3c9f5bdea38f758825fe99a8f0dd990f3e18d6759d816b
-
Filesize
1.2MB
MD5172fb19e149b278a98a3baa2e665dd44
SHA13276943217a2842fc66d5e0b3774ad44ba905207
SHA2560ed5a78cdc33f245004d77d237bc407808c815816ff0ae19d2ddf5f0c86429af
SHA512cab01441741d0b18bcb4f0f30d070f6062d96ae34a6d965884fffb3b1f6027aacf961c9da7af4bbb9afc1e486b761e4e96edd73483d4866fe932d94d47ec96fe
-
Filesize
1.2MB
MD550f7c0ff084b5550271bb25d7471f315
SHA13d5ad777523a6ffd5308e6be15415d35eabb0a30
SHA256e235c04c32aa619fe6610a1762cdb23cb53025dbd082ee526cdf52bf20f26eac
SHA512f51c1a458d630678ba494837ca7b5a5b8cf2f5cbf1424d1b2051efd9a3577451e6950c2f954260f532c533f89467a879b92d22ca13a5a9a7726bba710ae0c574
-
Filesize
1KB
MD52ef776f9de3ab21c63cd6ff8f1e87090
SHA11c52fdcc00aff87a398c5e7fd83f1d115302f05b
SHA256b95626aec93159616dac770e4ec4f8cb1e43d2148393553e1b0cfc010ae67690
SHA512ac145234570e2554715caf39ab4d9743e2c39d5b9c9fc4ff922708a5edc2be6835370b019e40dbfc22162db7c1166ac085a44b165e90657904c91e72535f6563
-
Filesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
Filesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9