Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
e87adb12a4d0bf15245bbd0d65bb0cfc
-
SHA1
56d12429ec379f1d6df251feb0ee6794ce410bed
-
SHA256
3e42df93d811b179bcebf9e9cfc4402a2b4f7aa92665ee3725850d141c35be09
-
SHA512
2244c10e117dcf2b1592e5e3bb513c3e0976d9765e4c924e82abe72c5948859a2819060d6bbcf6a67217abb7f81b1f1e7b2232e2ea6da6d082d67de61f81dd77
-
SSDEEP
24576:9uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:X9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2708 BdeUISrv.exe 2504 fveprompt.exe 632 Netplwiz.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2708 BdeUISrv.exe 1204 Process not Found 2504 fveprompt.exe 1204 Process not Found 632 Netplwiz.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\Rb8s\\fveprompt.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fveprompt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 rundll32.exe 2828 rundll32.exe 2828 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2596 1204 Process not Found 28 PID 1204 wrote to memory of 2596 1204 Process not Found 28 PID 1204 wrote to memory of 2596 1204 Process not Found 28 PID 1204 wrote to memory of 2708 1204 Process not Found 29 PID 1204 wrote to memory of 2708 1204 Process not Found 29 PID 1204 wrote to memory of 2708 1204 Process not Found 29 PID 1204 wrote to memory of 2716 1204 Process not Found 32 PID 1204 wrote to memory of 2716 1204 Process not Found 32 PID 1204 wrote to memory of 2716 1204 Process not Found 32 PID 1204 wrote to memory of 2504 1204 Process not Found 33 PID 1204 wrote to memory of 2504 1204 Process not Found 33 PID 1204 wrote to memory of 2504 1204 Process not Found 33 PID 1204 wrote to memory of 1356 1204 Process not Found 34 PID 1204 wrote to memory of 1356 1204 Process not Found 34 PID 1204 wrote to memory of 1356 1204 Process not Found 34 PID 1204 wrote to memory of 632 1204 Process not Found 35 PID 1204 wrote to memory of 632 1204 Process not Found 35 PID 1204 wrote to memory of 632 1204 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e87adb12a4d0bf15245bbd0d65bb0cfc_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2596
-
C:\Users\Admin\AppData\Local\B5YU\BdeUISrv.exeC:\Users\Admin\AppData\Local\B5YU\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2708
-
C:\Windows\system32\fveprompt.exeC:\Windows\system32\fveprompt.exe1⤵PID:2716
-
C:\Users\Admin\AppData\Local\jO5mrXy8p\fveprompt.exeC:\Users\Admin\AppData\Local\jO5mrXy8p\fveprompt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2504
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:1356
-
C:\Users\Admin\AppData\Local\aW29IqrQ\Netplwiz.exeC:\Users\Admin\AppData\Local\aW29IqrQ\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
1.2MB
MD5308519e53cdee9457a4e72249b87b15e
SHA1a9c181e8d6b2c2f29705e2e38093f7c97c2ce703
SHA256d3ff84a66230e45b0ceaee8ab9b59565dd5ac8c3c62e9f55489427da72d4a87f
SHA51208b606a0ec95f6074289eb19ecc79ec0fc85fdb5b742348f1bd16f3c38d06a3c2eea62e6ad859139833a043821c4a3f65164f75d66f546cf66b9dcc106da6a83
-
Filesize
1.2MB
MD5570ab67a4d2b782cb00dcdf8e616c57f
SHA14ed39ccdc3f74b55a451068d6edd5e111f9fd8b9
SHA256e392f9d8c2a68bae9aed6ebb6f7e0684a8e1cd849d28927ea1d7f410f6ef9548
SHA512e998644f77f5d6f0a059229858f0e92327a0960117720c05970ba324177b0eac1771bf5abcec40e36c10445148508ba46ba5b3d0423e9cd4490d8fcea780d0e5
-
Filesize
104KB
MD5dc2c44a23b2cd52bd53accf389ae14b2
SHA1e36c7b6f328aa2ab2f52478169c52c1916f04b5f
SHA2567f5b19f2c6a94833196ee1929d48094889b33b504d73d3af88dd857ceaf67921
SHA512ff083f74777a9cfc940d4e0cb55886397e27c85f867de9a5dd9ea2c2751d2a77bf75fe0734e424d9678c83e927788d07d0b3072024f7e5a9848c7ff1aa4090dc
-
Filesize
1.2MB
MD54555fefd10ca36b7d3a76fd2a9b294f7
SHA1a5bd756fdeda6b5742e7f93fa071b8f7c8a72b9b
SHA2564ba11723f88a82f51a1be8473636f39ace3b6514fa9e3ce925ccbf382ff5020c
SHA512957584285fd6419df7c0277b9f72dc4fa7df80d7d2cc923f139069e15413fcf752402678494d54b32c30d302d23404c365094a9d07b8ee49c99c575825fde52e
-
Filesize
1KB
MD51317cd5d33f1072505fdc7b101bf2e90
SHA1458e57d0066fad169dd64eddca97167d8f4f48df
SHA256c7a33fb68d78325bf70026532039546409e04dc2b00e4a887941ff3a14978cc5
SHA512fdfe5407c5e71107c52b003172055fd3b9ea10aa68e97c8c583c00d506b3e8a69726e63bd393ba4a514b88d9dba6e5bf2356bd42166a777dcdfcbeda3dcf4757
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08