Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ea01a6add7afdcb129fd6fff4ddb15ce
-
SHA1
11ec5fbc5ad77d25e9d22518f47f8f0b160a46a9
-
SHA256
d9be09a9dd8aaa00eeffcc1023440100139d3176e9ee7600fce67b7d754f204d
-
SHA512
6225b33bd6a0df411679014c25f23d0d41de3c96052f2eae86d1b072831a5e18bbb636775fbf88c2941b16d351aad70ec017545edb58d45122fe0e8cb1fc026d
-
SSDEEP
24576:MuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:k9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1364-5-0x0000000002AF0000-0x0000000002AF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2476 raserver.exe 1200 SndVol.exe 2056 consent.exe -
Loads dropped DLL 7 IoCs
pid Process 1364 Process not Found 2476 raserver.exe 1364 Process not Found 1200 SndVol.exe 1364 Process not Found 2056 consent.exe 1364 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\QZno\\SndVol.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 regsvr32.exe 1056 regsvr32.exe 1056 regsvr32.exe 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found 1364 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2440 1364 Process not Found 29 PID 1364 wrote to memory of 2440 1364 Process not Found 29 PID 1364 wrote to memory of 2440 1364 Process not Found 29 PID 1364 wrote to memory of 2476 1364 Process not Found 30 PID 1364 wrote to memory of 2476 1364 Process not Found 30 PID 1364 wrote to memory of 2476 1364 Process not Found 30 PID 1364 wrote to memory of 1424 1364 Process not Found 31 PID 1364 wrote to memory of 1424 1364 Process not Found 31 PID 1364 wrote to memory of 1424 1364 Process not Found 31 PID 1364 wrote to memory of 1200 1364 Process not Found 32 PID 1364 wrote to memory of 1200 1364 Process not Found 32 PID 1364 wrote to memory of 1200 1364 Process not Found 32 PID 1364 wrote to memory of 2272 1364 Process not Found 33 PID 1364 wrote to memory of 2272 1364 Process not Found 33 PID 1364 wrote to memory of 2272 1364 Process not Found 33 PID 1364 wrote to memory of 2056 1364 Process not Found 34 PID 1364 wrote to memory of 2056 1364 Process not Found 34 PID 1364 wrote to memory of 2056 1364 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ea01a6add7afdcb129fd6fff4ddb15ce_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2440
-
C:\Users\Admin\AppData\Local\TYfpFZRj3\raserver.exeC:\Users\Admin\AppData\Local\TYfpFZRj3\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2476
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:1424
-
C:\Users\Admin\AppData\Local\3gwTFGDd\SndVol.exeC:\Users\Admin\AppData\Local\3gwTFGDd\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1200
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:2272
-
C:\Users\Admin\AppData\Local\nTRpbX\consent.exeC:\Users\Admin\AppData\Local\nTRpbX\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59c7e8934e1205f45921e67388d728e28
SHA13bc40017bed5aebae9daece1c029c209fa5aadf0
SHA256b65dc0019caa1f7061cd06a6f2a0cc6720bd6406e9f96b18782fcffd50741088
SHA512f75057bfba4cdf9693102ae5d1b87fb820571a7990d27d8284185c3a9d6c48015b2461e5ed228cd23420f62b434b82fb71a6c7babb6aa055e0e2439a42163563
-
Filesize
1.2MB
MD54e6df26f7bea307f0a5f22e7b4b596e4
SHA125ad3ec0f4ec6a7d98c8e2c3ea209ede770f2e0e
SHA25628a7eae5bc224147c0c4da6a92f89f85ff5a2b08500c1e9db54819df33c1fbec
SHA51275d688a1709b111f4b1dd0763c28f764d160007134371cde837ac7ce76e33af0a574c5c1e80d05e178b400dde9c00f19e6fd4aae383364ad1c6c6c796c3e3e82
-
Filesize
1.2MB
MD57900ac67bce31986947dbd3dd8a5aca2
SHA110eac4c680929f76eef3566991e9703d4dd5fc04
SHA25693db665e75ebdd08c446200b0f561f01d894b5451c2eaaec228415158839a9c3
SHA512ed7e63f1fd5c7fcf7251f99baec24ea57c7c20e265d04ad3dfd5131e2a3535deb6fe518425331ef74a1ed08bde7194872b2476dd91a3263b9af3eb18ce5e0657
-
Filesize
1KB
MD55269e04d61664e2ad3244854fd057d10
SHA1b7d0beb193aec21ce9e205a74e591ac7e6e8788b
SHA256b0e1911d86fcf7ed92398c5f8d12b7093c1d06cf4b093c5b0229085f9caf5bb7
SHA5124de97fbbce829970f427c1e81c8b689d6d961246f1913b8a2ab17d36581640e5b2134ab5585dcfcb0b1eed7a20ef34207184dffc4e9f69b83cce1327833edf4a
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7