Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
ecc94ddcac7f889fba06679317c767a1_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ecc94ddcac7f889fba06679317c767a1_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ecc94ddcac7f889fba06679317c767a1
-
SHA1
75da782863c7e30f45939c0711057d37483bd437
-
SHA256
e06c71d9c6e770486e02dc3dc6fb9d8d640c3142b625d7a4e8ca0d99aff3b944
-
SHA512
f096735220bc58a172bc362aae448ac3e169418fd76a247c9d20fc814d93e8fde44e2a99e9a5a4ccac73b41dbbca3849bd7215cd4fbe8c68f26d3a512ec9444a
-
SSDEEP
24576:FuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:/9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-5-0x0000000002200000-0x0000000002201000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2796 consent.exe 800 xpsrchvw.exe 2460 consent.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2796 consent.exe 1244 Process not Found 800 xpsrchvw.exe 1244 Process not Found 2460 consent.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Orgemlwcbffgzj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\MZIhy\\xpsrchvw.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 984 rundll32.exe 984 rundll32.exe 984 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2808 1244 Process not Found 29 PID 1244 wrote to memory of 2808 1244 Process not Found 29 PID 1244 wrote to memory of 2808 1244 Process not Found 29 PID 1244 wrote to memory of 2796 1244 Process not Found 30 PID 1244 wrote to memory of 2796 1244 Process not Found 30 PID 1244 wrote to memory of 2796 1244 Process not Found 30 PID 1244 wrote to memory of 2612 1244 Process not Found 31 PID 1244 wrote to memory of 2612 1244 Process not Found 31 PID 1244 wrote to memory of 2612 1244 Process not Found 31 PID 1244 wrote to memory of 800 1244 Process not Found 32 PID 1244 wrote to memory of 800 1244 Process not Found 32 PID 1244 wrote to memory of 800 1244 Process not Found 32 PID 1244 wrote to memory of 2436 1244 Process not Found 33 PID 1244 wrote to memory of 2436 1244 Process not Found 33 PID 1244 wrote to memory of 2436 1244 Process not Found 33 PID 1244 wrote to memory of 2460 1244 Process not Found 34 PID 1244 wrote to memory of 2460 1244 Process not Found 34 PID 1244 wrote to memory of 2460 1244 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecc94ddcac7f889fba06679317c767a1_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:984
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:2808
-
C:\Users\Admin\AppData\Local\f8fE\consent.exeC:\Users\Admin\AppData\Local\f8fE\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2796
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:2612
-
C:\Users\Admin\AppData\Local\NhJZfj\xpsrchvw.exeC:\Users\Admin\AppData\Local\NhJZfj\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:800
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵PID:2436
-
C:\Users\Admin\AppData\Local\2YNUks\consent.exeC:\Users\Admin\AppData\Local\2YNUks\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b9ec32badaa704f986206dd73a5ef774
SHA140ab30d12ebbd78448f7dc3cee75f1e4a56fdd83
SHA25677e3143858855d10442b86ba120fc113044ce3776f27e167d964f7b0c687b4ab
SHA512ab70dbf7f3135ca026660848e46dbcafdd1aefef49c6d6be487221518ca13c6e90363799e37c9c2b477d8c905abaf2c670f40bd83f1fe7f5e21d550481e73576
-
Filesize
1.2MB
MD537d4d11c22002d4cffaccb8987889a4c
SHA13965c005676b2f084a3be04f90edd4074c48cf34
SHA256173df27710543549d4c36a2fdfc13cf115557940037688eb537c9044dce06d19
SHA512bdbeceb9e8dd15e50e245816878447e5a4aef26b9460c4c039295f8860766127b2e8d21d9ec5a80f4c1588abf45fe5d034bac7e192a87a7b33c0cca94269a244
-
Filesize
1.2MB
MD5dbddfafa764576bbb0423f6f40fe5fd5
SHA169e91ec5d794a03283216bd69bbd0b0cf9e77a57
SHA256dcd56a8080fba6ae1b5410ac2b6475b14bd620ab6dcd88eb2f1ec8eb7cbba5cb
SHA512a440bec53a6692b7be39b56045460983eb170d4269440b3584e9e7abed3741c78cbdbfd46957a0337e97b38099755ad47d2884f09f75d48990670a2492c0f544
-
Filesize
1KB
MD5b13fc85239da2ef4d2be917d67f3b0ab
SHA10ba1cda0244340c231365442fb73bf1ecb81f535
SHA25603e6e58dfb3aa1a28288a51bbc30671eca9b26f0178996b8dcdfefb4d163d6f2
SHA5125ef39887917c8a2f9dceddc06b560328af7fccea89b18258e73da7c2abc3c48844de4451e1815210df7062f607e72702b97f7133868195b2dc60430cfa1e6a94
-
Filesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
Filesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7