Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
034426c5bd525235fcafbbb062e0906c_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
034426c5bd525235fcafbbb062e0906c_JaffaCakes118.dll
-
Size
840KB
-
MD5
034426c5bd525235fcafbbb062e0906c
-
SHA1
035feff6c9fd3656aa4e91d9478d78fac9cab06d
-
SHA256
eeae042764b330ce8fcf47e9f959389658b9babc7d9bf84b9836adc1fec4565d
-
SHA512
182eefa4e540076bf5d65f193142eb6b15713c2449d2a45c788b6e6fcddb241a542fe763481c5eb6673d6861642efde081d3ee3cbb9421e51d0dba1f4980fc76
-
SSDEEP
12288:PdMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:VMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1228-4-0x00000000026A0000-0x00000000026A1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2736-1-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/1228-46-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/2736-52-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/1228-58-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/1228-59-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral1/memory/1096-76-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral1/memory/1096-80-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral1/memory/1628-97-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral1/memory/2396-111-0x0000000140000000-0x00000001400D4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
wbengine.exeraserver.exemfpmp.exepid process 1096 wbengine.exe 1628 raserver.exe 2396 mfpmp.exe -
Loads dropped DLL 7 IoCs
Processes:
wbengine.exeraserver.exemfpmp.exepid process 1228 1096 wbengine.exe 1228 1628 raserver.exe 1228 2396 mfpmp.exe 1228 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Orgemlwcbffgzj = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\99M\\raserver.exe" -
Processes:
rundll32.exewbengine.exeraserver.exemfpmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1228 wrote to memory of 2112 1228 wbengine.exe PID 1228 wrote to memory of 2112 1228 wbengine.exe PID 1228 wrote to memory of 2112 1228 wbengine.exe PID 1228 wrote to memory of 1096 1228 wbengine.exe PID 1228 wrote to memory of 1096 1228 wbengine.exe PID 1228 wrote to memory of 1096 1228 wbengine.exe PID 1228 wrote to memory of 2720 1228 raserver.exe PID 1228 wrote to memory of 2720 1228 raserver.exe PID 1228 wrote to memory of 2720 1228 raserver.exe PID 1228 wrote to memory of 1628 1228 raserver.exe PID 1228 wrote to memory of 1628 1228 raserver.exe PID 1228 wrote to memory of 1628 1228 raserver.exe PID 1228 wrote to memory of 2020 1228 mfpmp.exe PID 1228 wrote to memory of 2020 1228 mfpmp.exe PID 1228 wrote to memory of 2020 1228 mfpmp.exe PID 1228 wrote to memory of 2396 1228 mfpmp.exe PID 1228 wrote to memory of 2396 1228 mfpmp.exe PID 1228 wrote to memory of 2396 1228 mfpmp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\034426c5bd525235fcafbbb062e0906c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:2112
-
C:\Users\Admin\AppData\Local\AGA1KQiT\wbengine.exeC:\Users\Admin\AppData\Local\AGA1KQiT\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1096
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2720
-
C:\Users\Admin\AppData\Local\hmCAZd\raserver.exeC:\Users\Admin\AppData\Local\hmCAZd\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1628
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵PID:2020
-
C:\Users\Admin\AppData\Local\ANibHdad\mfpmp.exeC:\Users\Admin\AppData\Local\ANibHdad\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
844KB
MD5bdb0495c908c41d2ab2b7a7ce2be812a
SHA12b5627cd8d83ed99ed5f9d37d54613e40c86dc0f
SHA2562d2a9571481e59d8034d0442732806d886001f202d5687d81bb537757c32702b
SHA512a9ae3320e6feaf5fe53258e654abfda1e9af12b2a11aa545fbb43e1ab4f97bc9da4d5a1fa76719ad20828cdfb815637e259b94a75649b7e54a9a1e9d9c8500bb
-
Filesize
848KB
MD59fc1e36d6e5f8e43e8e9e6ee45a7ceda
SHA10fef52956241a3db1611ae05fb5ddbb4272872f9
SHA25641d5fd1392501eeb640946919e710431612b3ab5bdbd5e75b4a26a03af4d3b7f
SHA512e8c0f61233b1bccd67ae29f023d7815321046f7f27048c9f3cc6d527e635398a6b15c0ae840665734f232ac325fb30478f90bb3da5f3e266908da33b3de2aad4
-
Filesize
844KB
MD5d1f6b07eceb98411f1406ac85d8c9507
SHA1770437b6ae590631e2365461f1ea706fc1cedee6
SHA256330eb1649c8ee07eac63a4925cc8663993985f1c8a07e3b4d62941c22ad55ab8
SHA512e2e1f46d863ce825e1349921437ba29c21a85aadb3726e349c0da40c3a303e1d2af1a827ef9eaf6236ee4f2839d9bd63cd78bad8c03f8cd59593206f85bf22a5
-
Filesize
1KB
MD5abe481c4fd5bd976044a5840058a7ad2
SHA11e17fb7a83fa5f4fb4c6f706712951202e60ec63
SHA2567174f2cbb10db15b7fa1f319317c7355a5f6d2f6659516a74973d922fb54a908
SHA5123a6ab332e0366c067c6de7f9cfb46f9d99605f1d3145a4b949426eabc497747ac524dbf7d884917b244af7742bcd37aa29e694eb59bb156e76fba4a359e534e9
-
Filesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
Filesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac