Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
e8b8a0027996e15a3fd8e3bb55f082f6_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e8b8a0027996e15a3fd8e3bb55f082f6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
e8b8a0027996e15a3fd8e3bb55f082f6
-
SHA1
fa6157e38d9e14774b12b52d599b516e05ba3ed6
-
SHA256
77ccaeda8a23dc24a8d57f41db284d1cadac6c9ba46781728fb31e0102eb874d
-
SHA512
b8cdb6f404cf34f05afcb5a948b9ba1c3e7f615cf9f1beaddb6ff3632e0d00187ed97967a56eada005c2862368c50f4aeb08185ca8c0136bbfbaa7b85305f242
-
SSDEEP
24576:PuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NMt:x9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002DA0000-0x0000000002DA1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2476 SystemPropertiesHardware.exe 1808 sigverif.exe 2332 SndVol.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2476 SystemPropertiesHardware.exe 1200 Process not Found 1808 sigverif.exe 1200 Process not Found 2332 SndVol.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\An2oV\\sigverif.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1660 rundll32.exe 1660 rundll32.exe 1660 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2428 1200 Process not Found 29 PID 1200 wrote to memory of 2428 1200 Process not Found 29 PID 1200 wrote to memory of 2428 1200 Process not Found 29 PID 1200 wrote to memory of 2476 1200 Process not Found 30 PID 1200 wrote to memory of 2476 1200 Process not Found 30 PID 1200 wrote to memory of 2476 1200 Process not Found 30 PID 1200 wrote to memory of 864 1200 Process not Found 31 PID 1200 wrote to memory of 864 1200 Process not Found 31 PID 1200 wrote to memory of 864 1200 Process not Found 31 PID 1200 wrote to memory of 1808 1200 Process not Found 32 PID 1200 wrote to memory of 1808 1200 Process not Found 32 PID 1200 wrote to memory of 1808 1200 Process not Found 32 PID 1200 wrote to memory of 672 1200 Process not Found 33 PID 1200 wrote to memory of 672 1200 Process not Found 33 PID 1200 wrote to memory of 672 1200 Process not Found 33 PID 1200 wrote to memory of 2332 1200 Process not Found 34 PID 1200 wrote to memory of 2332 1200 Process not Found 34 PID 1200 wrote to memory of 2332 1200 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e8b8a0027996e15a3fd8e3bb55f082f6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:2428
-
C:\Users\Admin\AppData\Local\M4vvG\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\M4vvG\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2476
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:864
-
C:\Users\Admin\AppData\Local\DgmhMs7\sigverif.exeC:\Users\Admin\AppData\Local\DgmhMs7\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1808
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵PID:672
-
C:\Users\Admin\AppData\Local\wb6j9bl\SndVol.exeC:\Users\Admin\AppData\Local\wb6j9bl\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50aef8f583c95e75a152d2d7484172872
SHA16c1d47bdbafcd6e42172e652f7920dd6a7caf662
SHA256fdee08ee4515ac76aa5c2e84eef6403741d4b93ec0db3068bf8ac333a78e78f9
SHA5129bf4eb8fb667828f0444dbda2cbdd9b23b9173721a6fd46435345ce8aa7c5db4cdb0b41d6133d864905c04b4dd9687f5f2c08e41ee3c99fc64ec2e8911cb1e78
-
Filesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
Filesize
1.2MB
MD5ac6e78eacb7b38de582a03adb76938d0
SHA173fc0de5b7c274de4d6e788a1eeacdbf2bbe1c10
SHA256b2cd9cec961599e5e7c5460fa0cb528eecbe6155519af242ae8ee926df5146f9
SHA512dab0377e28529b5ba0d773396b2546f6809cf51a7c5116600e70124ef40585ba9df887479554cca6d0b5af6410f10acfc7d4ec630956eec21689e5df654debb6
-
Filesize
1KB
MD5b155bfea12ace40e84b80290cf0b2804
SHA12d703cf90cbd26e15403c9e2d7a3592ffe39c667
SHA256b4c4802719d90e5908e561d9cbfbbfce8311ecfa2b3356960c07f5c859377de0
SHA5128fa947034e3a1d750cf8838a9ced8c13288622561ee82335bc56fd606c6274fd5f6fa31a4992d8285bf86d5b86e9ba262b4e522bfe87126a4e0d1a95bee02e20
-
Filesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
1.2MB
MD56af8e31475096e41634faf8635654b4a
SHA14d6c5931e6dbb6afc0372c5fd0db2f42d0979fb0
SHA2566e75e5c265810c2afa412768a21daa47dff160a5511be62255d7712356693f0c
SHA512ccf4c48a73e38c6aa58abbcf36ca4f99048e3e3aa9dbdad8fc2c14213d2368d98be2163a206455d8f4f5eeb2597556b990368a3e3c19e4ebf0ebd6209f88ad48