Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
f963cdd13e8a02e085ad96942c7b697e_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
f963cdd13e8a02e085ad96942c7b697e_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f963cdd13e8a02e085ad96942c7b697e
-
SHA1
c45bbdcfa0d01b667a899c580eaf672c17f6476e
-
SHA256
d2b8767e0bc73b401800438a4249a81a7fc998d126f98ee574779b3629569e9c
-
SHA512
442f9c643485bece188752fbac53aa9c2bfbbefc273c1b60e37d0e9625fdda2caf3ade1ebef99acb0964f015203c9ecea72cdb4250cf328b88b5ca8419a0701d
-
SSDEEP
24576:iVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8v:iV8hf6STw1ZlQauvzSq01ICe6zvmU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1176-5-0x0000000003060000-0x0000000003061000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2928 mfpmp.exe 1420 cttune.exe 2820 cttune.exe -
Loads dropped DLL 7 IoCs
pid Process 1176 Process not Found 2928 mfpmp.exe 1176 Process not Found 1420 cttune.exe 1176 Process not Found 2820 cttune.exe 1176 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\WZFrUZ\\cttune.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2192 rundll32.exe 2192 rundll32.exe 2192 rundll32.exe 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found 1176 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2536 1176 Process not Found 28 PID 1176 wrote to memory of 2536 1176 Process not Found 28 PID 1176 wrote to memory of 2536 1176 Process not Found 28 PID 1176 wrote to memory of 2928 1176 Process not Found 29 PID 1176 wrote to memory of 2928 1176 Process not Found 29 PID 1176 wrote to memory of 2928 1176 Process not Found 29 PID 1176 wrote to memory of 992 1176 Process not Found 30 PID 1176 wrote to memory of 992 1176 Process not Found 30 PID 1176 wrote to memory of 992 1176 Process not Found 30 PID 1176 wrote to memory of 1420 1176 Process not Found 31 PID 1176 wrote to memory of 1420 1176 Process not Found 31 PID 1176 wrote to memory of 1420 1176 Process not Found 31 PID 1176 wrote to memory of 1788 1176 Process not Found 32 PID 1176 wrote to memory of 1788 1176 Process not Found 32 PID 1176 wrote to memory of 1788 1176 Process not Found 32 PID 1176 wrote to memory of 2820 1176 Process not Found 33 PID 1176 wrote to memory of 2820 1176 Process not Found 33 PID 1176 wrote to memory of 2820 1176 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f963cdd13e8a02e085ad96942c7b697e_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:2536
-
C:\Users\Admin\AppData\Local\6b2e3jPeB\mfpmp.exeC:\Users\Admin\AppData\Local\6b2e3jPeB\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵PID:992
-
C:\Users\Admin\AppData\Local\4Ah\cttune.exeC:\Users\Admin\AppData\Local\4Ah\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1420
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵PID:1788
-
C:\Users\Admin\AppData\Local\RbgV7L\cttune.exeC:\Users\Admin\AppData\Local\RbgV7L\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b835baa7b54f65ad2407823ff1f47ae7
SHA1228b9a098caadeff9ba979ce299bdf3753de7c79
SHA256b57c8e94a14d8be57ab4df91a4b866c08b34e9beb6c47e8f0ca58ee864b78ce0
SHA5123dcf6039842929bceb5b2d9300661f1466019bff33cd98ac9e1eb8c358d3a18172430a0d5c8dbfbddd78a8c82027f21d2aeb25b15d4231892d530c54820c6695
-
Filesize
1.2MB
MD587885032159e359dae8da1ce27a9741a
SHA11ec7dbfae0618219fdd3819512261a3b6a50809d
SHA2567207e8a76586af0672f9b85098c4793b336f2827fa1c66031ebe47cecfe3eae7
SHA512e637e036abf6be5ea84577aa1b557d75b90ba3060bdf378bcffc7f73006eaa51293302d40ad4bca1e57fbd8d6577bc85c55f39745d0016c52c12c6c73a279c8a
-
Filesize
1.2MB
MD5eff4bc05d382b983792b094de44a7a2a
SHA1447a25706408decf8d00de36b40cdc5d4cb40c40
SHA25696649e5ce7372632bd60edbb061305def127a40f91896443815b3c8fd0b2c0a2
SHA51250deb631097fc9e78b05dd5b728d4dba2f463d728131e0abd20dfd4c29b291a961c4ee84d4b07d4b8046dee408e5e92566d40811831fbe13bd2d5f599e8c33e4
-
Filesize
1KB
MD5825dcc2d6f7e62882e288fec96a5683e
SHA1e617e50fb151643436f9449499e9ff5b84805a0c
SHA2564909154b4654a48d12154791d6789632490d562627012a5bda2c77a6058bfb3a
SHA512210246a60b83bfe7b2dd76eea6761c6a405c65274df7927b46b4a64eb22ef8a94b38d121091db1345e425edd061c9a0dd1d1051f875f50fa6d12717e783dc1e3
-
Filesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc