Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ebcb62508d4e535105b49f6b45d8ded7_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
ebcb62508d4e535105b49f6b45d8ded7_JaffaCakes118.dll
-
Size
987KB
-
MD5
ebcb62508d4e535105b49f6b45d8ded7
-
SHA1
9f38415ba19244d0464092f9b6a0c0d8e87072c3
-
SHA256
e8419cca0b781e6ed1d9fa6ec25ca11ca48c7e69665891729fd86ad5025811c6
-
SHA512
37cd1a593852b6d7a75f86f32bde60d4976f4bc87a0d5a89061004050a19279c6bfffb925195ac7a9ad2b31fffa8eb1b3110a1e5614bf90c04732e592e19e31a
-
SSDEEP
24576:kVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:kV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x00000000024A0000-0x00000000024A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2568 spinstall.exe 2396 osk.exe 1432 rrinstaller.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2568 spinstall.exe 1200 Process not Found 2396 osk.exe 1200 Process not Found 1432 rrinstaller.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\VDN\\osk.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spinstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3020 1200 Process not Found 30 PID 1200 wrote to memory of 3020 1200 Process not Found 30 PID 1200 wrote to memory of 3020 1200 Process not Found 30 PID 1200 wrote to memory of 2568 1200 Process not Found 31 PID 1200 wrote to memory of 2568 1200 Process not Found 31 PID 1200 wrote to memory of 2568 1200 Process not Found 31 PID 1200 wrote to memory of 1956 1200 Process not Found 32 PID 1200 wrote to memory of 1956 1200 Process not Found 32 PID 1200 wrote to memory of 1956 1200 Process not Found 32 PID 1200 wrote to memory of 2396 1200 Process not Found 33 PID 1200 wrote to memory of 2396 1200 Process not Found 33 PID 1200 wrote to memory of 2396 1200 Process not Found 33 PID 1200 wrote to memory of 2288 1200 Process not Found 34 PID 1200 wrote to memory of 2288 1200 Process not Found 34 PID 1200 wrote to memory of 2288 1200 Process not Found 34 PID 1200 wrote to memory of 1432 1200 Process not Found 35 PID 1200 wrote to memory of 1432 1200 Process not Found 35 PID 1200 wrote to memory of 1432 1200 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebcb62508d4e535105b49f6b45d8ded7_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
C:\Windows\system32\spinstall.exeC:\Windows\system32\spinstall.exe1⤵PID:3020
-
C:\Users\Admin\AppData\Local\88XD\spinstall.exeC:\Users\Admin\AppData\Local\88XD\spinstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2568
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:1956
-
C:\Users\Admin\AppData\Local\9UUO\osk.exeC:\Users\Admin\AppData\Local\9UUO\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2396
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2288
-
C:\Users\Admin\AppData\Local\ClU5wg\rrinstaller.exeC:\Users\Admin\AppData\Local\ClU5wg\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987KB
MD5e25445e69794b4f297e6ba918e3d98d8
SHA14a51311a2370adf33e472e966393baccc480f33b
SHA256222686e10f2bdb56017d8ef3bd2aa0adb5d850e1834848a09fc5478f30e87832
SHA512853ceac6c97854cc6d613b8ddda358929d59d8172d429e82404d0f6a6b5cf7b289461f9d3746080b05fcc723b792886b7cc6a8dc58c15a490dbad06e4b979197
-
Filesize
988KB
MD5a05902a24efcd28d2c4458203c1f5898
SHA1509dd61a82deaf992560fec41f880e176e123fd3
SHA256c141225e1e73e676c2be9cda5abb931ac714612375cdbcd25ed399023ac7f3e7
SHA5123f56cc9d176a6890964475f89387e803d2e8e1a434df4faa916d396fc41dd6e2f83fc2fc687d9331a3c673613b6f1cbdc816bcbe4afdf5f47d6ae3f88b29a12a
-
Filesize
992KB
MD5e7e5cee69733c66d6902102e0f648218
SHA1d5ba66dec04f2e675482764ae5a6422de190c81e
SHA256989b95a226e0fedeab81b53ded503ae1941b977514ccd0b385bbb614ef79dc32
SHA5128df9941ce43a6f4a9bdc3167b18131e2422bd2c4614d7ef6aae57516e1e97f6d7faa766c645c73557ea052a3901321941a6962836065710608c129a762a8e5b9
-
Filesize
1KB
MD53e83deff6533f1a707eb1119414c978a
SHA14a625a44026f10beee335b8de2a46b4fe7ab4cd1
SHA2562b917b9d324b602f57fcc03c84c87124f173bbb11ea80edae305bd3e1e5e018a
SHA5127e1b54d69bc525f2acb4c51ab615e6c546f72e2c5a3dce646413d6f0fbfbecafd0af0f89af3a3bde42d9e227bd80c7e40bfef53417099fc3999265bf8ebe7bc4
-
Filesize
584KB
MD529c1d5b330b802efa1a8357373bc97fe
SHA190797aaa2c56fc2a667c74475996ea1841bc368f
SHA256048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f
SHA51266f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee
-
Filesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4