Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
ef9282ff41251164cb2b293d8ebe082f
-
SHA1
01f039edc40c69125d5c04be228eb6f7a23fb931
-
SHA256
561f41e1bb21a3e96a3497b1ac70f8dd0026946d928d7757b659ca8518fe2f48
-
SHA512
988b9f019112ce40c3c6cf7a2528ff094eb4684ced6310232d9b5326bb07e23136447a4107e961b9237bd292d3009857b15132e01256b2e89a661305e45d99d2
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NaiH/:G9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1208-5-0x0000000002D00000-0x0000000002D01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Dxpserver.exespreview.exeNetplwiz.exepid Process 2964 Dxpserver.exe 1952 spreview.exe 1956 Netplwiz.exe -
Loads dropped DLL 7 IoCs
Processes:
Dxpserver.exespreview.exeNetplwiz.exepid Process 1208 2964 Dxpserver.exe 1208 1952 spreview.exe 1208 1956 Netplwiz.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Auwqk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\I0\\spreview.exe" -
Processes:
Netplwiz.exerundll32.exeDxpserver.exespreview.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 2112 rundll32.exe 2112 rundll32.exe 2112 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1208 wrote to memory of 2652 1208 31 PID 1208 wrote to memory of 2652 1208 31 PID 1208 wrote to memory of 2652 1208 31 PID 1208 wrote to memory of 2964 1208 32 PID 1208 wrote to memory of 2964 1208 32 PID 1208 wrote to memory of 2964 1208 32 PID 1208 wrote to memory of 2740 1208 33 PID 1208 wrote to memory of 2740 1208 33 PID 1208 wrote to memory of 2740 1208 33 PID 1208 wrote to memory of 1952 1208 34 PID 1208 wrote to memory of 1952 1208 34 PID 1208 wrote to memory of 1952 1208 34 PID 1208 wrote to memory of 2352 1208 35 PID 1208 wrote to memory of 2352 1208 35 PID 1208 wrote to memory of 2352 1208 35 PID 1208 wrote to memory of 1956 1208 36 PID 1208 wrote to memory of 1956 1208 36 PID 1208 wrote to memory of 1956 1208 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef9282ff41251164cb2b293d8ebe082f_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2652
-
C:\Users\Admin\AppData\Local\0iEq4Vl\Dxpserver.exeC:\Users\Admin\AppData\Local\0iEq4Vl\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2964
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2740
-
C:\Users\Admin\AppData\Local\7py\spreview.exeC:\Users\Admin\AppData\Local\7py\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1952
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:2352
-
C:\Users\Admin\AppData\Local\FF6Iy\Netplwiz.exeC:\Users\Admin\AppData\Local\FF6Iy\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD520acf6f5df29e77375be5d39c7b18992
SHA14cee3010f8d3cf8c32a3ea5be3036126190c29b4
SHA256a9813b5e9dc59198e5cb9ec9af3c04e2abc668e7e0db84f01762f7800c54ade1
SHA512248742e5ac214d8e754f9ad03fdde49204c2172ac44da876ed21d5c9f47ca291dae60483514f14a9e9b959aa2b7ac9789ce04a0d5f4925961422b4fd6d00af90
-
Filesize
1.4MB
MD59b2ffbcd107bd7121163a4b174ff40b5
SHA157eed1bbdc0bdd4ef046b16ffaa9d09b40c71855
SHA256e068f4281bf6eddb4af96b6d1bbb10bbbcc98db397a306fdcb37475791641e7d
SHA512b6d246e7d7c2e8080a8ef7ee774f6de8aa7e0869bd7ce4f502ccc6a7a3a2578bddfd5a9ce1c443698503ba2b50ccdb885738f435c03c25cac5af744cff568daf
-
Filesize
1.4MB
MD56ba1605498b5beaf58dd960c6805fde3
SHA152da8377492c1748d75fbe6bdaa0d79d6842755c
SHA256031c996db34255c11bb991df7c0afac0d5914bffbe2c7c5c4ed103c94506b302
SHA5123dea716aa49662eeb569530f413fb9622fd70950bd4986fc014fe62f81e387d3c31d0010eb6abee804bfb2318bacf4d33a49a5ac1c201d873b846648f82b9411
-
Filesize
1KB
MD51e044942609d8528804f4ff95dea49bd
SHA105ca33e8e6056290db2826ea1c79fcfb409ba5fa
SHA25693be00100c7ef90f8aec053d77225a558a1b13678d1f430d23185a52020bdf50
SHA51242362705973f4dc2e8931fa1cb52bc0af6d8a95edef8695c13ee83e5076c0091ca50504c289999fc1ac76fe3a8f79cad1aff0fe866877ee5421cdbb70efa94c5
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08