Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
ff362bd68f2c0d7edc8ae6daea65bff2
-
SHA1
13eec145c843327764da8f7b7bfd7497f36e9fd9
-
SHA256
93c6d28fa2d592b75125079c8830ee790701ab730ba25a3a540c29ee6b7ecd01
-
SHA512
c9bcaedff9f396bf4f00877d91b22c13c58cb8c31a844520424cbd8548412de6c8d02262e43eeefbfcafad5eaafaa2b767490b97efae036c7e55d671df2af5d6
-
SSDEEP
24576:buYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N3:F9cKrUqZWLAcUv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1216-5-0x0000000002E10000-0x0000000002E11000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wscript.exewscript.exeMpSigStub.exepid Process 2632 wscript.exe 2176 wscript.exe 2928 MpSigStub.exe -
Loads dropped DLL 9 IoCs
Processes:
wscript.exewscript.exeMpSigStub.exepid Process 1216 1216 2632 wscript.exe 1216 1216 2176 wscript.exe 1216 2928 MpSigStub.exe 1216 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\KQ2POO~1\\wscript.exe" -
Processes:
rundll32.exewscript.exewscript.exeMpSigStub.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1216 wrote to memory of 2712 1216 31 PID 1216 wrote to memory of 2712 1216 31 PID 1216 wrote to memory of 2712 1216 31 PID 1216 wrote to memory of 2632 1216 32 PID 1216 wrote to memory of 2632 1216 32 PID 1216 wrote to memory of 2632 1216 32 PID 1216 wrote to memory of 3048 1216 33 PID 1216 wrote to memory of 3048 1216 33 PID 1216 wrote to memory of 3048 1216 33 PID 1216 wrote to memory of 2176 1216 34 PID 1216 wrote to memory of 2176 1216 34 PID 1216 wrote to memory of 2176 1216 34 PID 1216 wrote to memory of 3060 1216 35 PID 1216 wrote to memory of 3060 1216 35 PID 1216 wrote to memory of 3060 1216 35 PID 1216 wrote to memory of 2928 1216 36 PID 1216 wrote to memory of 2928 1216 36 PID 1216 wrote to memory of 2928 1216 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff362bd68f2c0d7edc8ae6daea65bff2_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2712
-
C:\Users\Admin\AppData\Local\MfgQW\wscript.exeC:\Users\Admin\AppData\Local\MfgQW\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:3048
-
C:\Users\Admin\AppData\Local\GgYf\wscript.exeC:\Users\Admin\AppData\Local\GgYf\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2176
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:3060
-
C:\Users\Admin\AppData\Local\OulcaxF\MpSigStub.exeC:\Users\Admin\AppData\Local\OulcaxF\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5284c8266ea39155be12310ef54054d7c
SHA1410aa4ec18265492b5cc65d44c7a37422569ce91
SHA2568821d3173e4ba4ac4e05e6c3a2552027a6c7f99771dc70db3427b8472939ba25
SHA512145e6e35e9ee364adb34760a2279d83eeebd04893a0e4047f29c75d52f9b8dcb0e12e669fc267c97ab5a37445dd26fbaaa91413e5b3003354d254e1d0656ea20
-
Filesize
1.2MB
MD5825bc0ea5d2bece24169d0d224ba3134
SHA1c545dc8141ba82f4a17844194c7850a44fdceba6
SHA25634f8d34d24fc4db2e62c63860d6382c6f839f1ec337eb248de05684024b7998d
SHA5120f5df5b38ab27898cf33dc7ffefbb7dae6ccf49137a1680fd94fbf8b606edf5322858dafc3d3ef464efe62bed9513560c8bad15c43a00ddd4b7ed333bf39c896
-
Filesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
Filesize
1.2MB
MD57a99d60fb0bdba900914a34e2e3bc970
SHA1c28665743324e25e9d6d5f8550839292838cbe02
SHA2566a7c50786db8bc270130d009021de39762e86ae4699715c7ae33e69a685d504a
SHA512bf2339ce13040553dde57962efb4777538ecfbbcb80ee91330450ea687a6bab27b0c0c2a78430791c0c00cba6462f623b0d27852bca0697f8430bea9e592d930
-
Filesize
1KB
MD546b67cac37bebe3256b6610942eb7ddd
SHA1613310617a50b894c979456649a7b129e9f7855b
SHA256d3aa63870b4e56bf2d487a6a60f7279720b856b78410cd649d1801c681f76558
SHA512af464d9ac586f8d0f22a5a8ebf919839698c432766fc9b7a6e533abc2c48e1be9643f3519e932a5e5e4ee323affdec2e9c950bce3b2774518339b4073117f636
-
Filesize
264KB
MD52e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542