Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
f8881045a1ea4f61e672b9e6edcc4a8b_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f8881045a1ea4f61e672b9e6edcc4a8b_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f8881045a1ea4f61e672b9e6edcc4a8b
-
SHA1
aebacdb61c914143ba4160c44fa458be9559f358
-
SHA256
505e175a4ff5d40800c0cf4a00332b8230504090a9f24b1f255d86770dbb23b6
-
SHA512
b683a09a09942ba5e0d16ed752d81bfe72cfa8f100d9ec7dd6bbfb98495cdb26eb383beafa16e777a1452f9758cfe0305545381cbb5c32019119926440741992
-
SSDEEP
24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-5-0x0000000002B10000-0x0000000002B11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2908 VaultSysUi.exe 2800 dpnsvr.exe 2356 wextract.exe -
Loads dropped DLL 8 IoCs
pid Process 1244 Process not Found 1244 Process not Found 2908 VaultSysUi.exe 1244 Process not Found 2800 dpnsvr.exe 1244 Process not Found 2356 wextract.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Orgemlwcbffgzj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\ZiIbb\\dpnsvr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VaultSysUi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 984 rundll32.exe 984 rundll32.exe 984 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2576 1244 Process not Found 29 PID 1244 wrote to memory of 2576 1244 Process not Found 29 PID 1244 wrote to memory of 2576 1244 Process not Found 29 PID 1244 wrote to memory of 2908 1244 Process not Found 30 PID 1244 wrote to memory of 2908 1244 Process not Found 30 PID 1244 wrote to memory of 2908 1244 Process not Found 30 PID 1244 wrote to memory of 3044 1244 Process not Found 31 PID 1244 wrote to memory of 3044 1244 Process not Found 31 PID 1244 wrote to memory of 3044 1244 Process not Found 31 PID 1244 wrote to memory of 2800 1244 Process not Found 32 PID 1244 wrote to memory of 2800 1244 Process not Found 32 PID 1244 wrote to memory of 2800 1244 Process not Found 32 PID 1244 wrote to memory of 2580 1244 Process not Found 33 PID 1244 wrote to memory of 2580 1244 Process not Found 33 PID 1244 wrote to memory of 2580 1244 Process not Found 33 PID 1244 wrote to memory of 2356 1244 Process not Found 34 PID 1244 wrote to memory of 2356 1244 Process not Found 34 PID 1244 wrote to memory of 2356 1244 Process not Found 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8881045a1ea4f61e672b9e6edcc4a8b_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:984
-
C:\Windows\system32\VaultSysUi.exeC:\Windows\system32\VaultSysUi.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\IlJJmS0d\VaultSysUi.exeC:\Users\Admin\AppData\Local\IlJJmS0d\VaultSysUi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵PID:3044
-
C:\Users\Admin\AppData\Local\Raib6\dpnsvr.exeC:\Users\Admin\AppData\Local\Raib6\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2800
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵PID:2580
-
C:\Users\Admin\AppData\Local\puDpfTB0\wextract.exeC:\Users\Admin\AppData\Local\puDpfTB0\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ba0cfd74dbf7938fa7785953ae18772e
SHA1445b79222020fb2a524f3bf53d715a6d29e65185
SHA2562d0bb8e7967b7aa13aefe730d8d5b6e197c8b79c56571d45d1b42cd3d0fcd80d
SHA5124f5fcfab66e1a78e9b191a64fabb8d42b67ac1ab092db697b88136365094567c401e84b7fb22f24d3b6f9fc132f68475247a241e09d5428bb5c0f22b8ef9bdab
-
Filesize
1.2MB
MD5d5098227a882337c295ee44054c84671
SHA1ddc8b36f4df1f08700f5895e371fbfcb72743364
SHA256d4aa26b78c6a30ae3a478a48751feaebcfc8cd0d91911d22e6e274550ef0ef91
SHA5123ae3c28cabf57e43687e6ade4cfea66ddabe7499d22ed86e64c0166ae847b3b7e460fee50d808e260ef3cc6f42cf0984d138f3732b0c6f9de390e5eafd1238c9
-
Filesize
1.2MB
MD5ebc7a714a95a95c20cd91c7d8c28429d
SHA1a2a83014fb2f96511ce76765bf18ac40b1cc7ec5
SHA256be0b12b28b5960b118b12ed6c94257d5b4dbec1739962de90dd5141f93da46e0
SHA512d5b6cd6f05b411ac8a244748760865c8c0e2e2562335f28488e58ef846beaca5069bc438a5c9751ac7326ea0839be4a45a91cfd606e1f5bb8fad5d7bcb00650c
-
Filesize
1KB
MD5cf0ff1a231958587629c4c976eaefb31
SHA150485e56e77daad15600ac11d50f57045bf48064
SHA25675ba02d23c9960b50000623dc69ddd7318f738e26ca8af05de4d1cde9e70b0f6
SHA5120c0e3128dcf3c351aa00c1168eaad6f4d33f7489582bc7d87f14c47b2e9911ad3fdf58338274a5660734b15e978d98bfeaeed6c8ef046f9c0096af6f8332b16f
-
Filesize
39KB
MD5f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1
-
Filesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b
-
Filesize
140KB
MD51ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb