Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
26976ba397f41991ffdeeff1031bf052_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26976ba397f41991ffdeeff1031bf052_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
26976ba397f41991ffdeeff1031bf052_JaffaCakes118.dll
-
Size
973KB
-
MD5
26976ba397f41991ffdeeff1031bf052
-
SHA1
a0978b28fd4ccba8529a9aab00bc370abb1508ff
-
SHA256
9277022581a6a6565e4a1f7dd5b2c499cf62fd8e176450c0f4b2dca9fc70ce47
-
SHA512
8665cefa87ce3698443d317e50a71f6baf45467cd1271b2799b49259c634ef742fb1ba95916f482012dd877dec452ea5efdd95c77008e6d5d37a1566034f40ac
-
SSDEEP
24576:NIuIxBOQNcKv8RtflMQazYZPT29BL0qNsX90nn:i0+YZr2DR6Xg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1280-5-0x00000000029B0000-0x00000000029B1000-memory.dmp dridex_stager_shellcode -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe 3004 regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 2796 explorer.exe 2824 explorer.exe 1084 explorer.exe 408 explorer.exe 2420 explorer.exe 2628 explorer.exe 2816 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 1084 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 408 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2420 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 1084 explorer.exe 408 explorer.exe 408 explorer.exe 408 explorer.exe 408 explorer.exe 408 explorer.exe 408 explorer.exe 408 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\26976ba397f41991ffdeeff1031bf052_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1084
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:408
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2816
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:1644