Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
9b736eaf2c05ce53035ffd01e89966ec_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
9b736eaf2c05ce53035ffd01e89966ec_JaffaCakes118.dll
-
Size
908KB
-
MD5
9b736eaf2c05ce53035ffd01e89966ec
-
SHA1
c80b5109d5996dec0d4764b3a8524a2f82af1cde
-
SHA256
cae5ab2ba8aa12b42c216e1d1b3efb016a89826e07e1bba5213e6ede4fb11a00
-
SHA512
86c87851b5fe98215ab9d835139626c297522761daeb5f753cc998172e36275ceebd997b0f6a6b59da2ec42a8223ab86dfceafbf58ecb3dd6f8a1359df1cd00a
-
SSDEEP
24576:QKfE4IeyDiRhMnFKO2pS9BDrFYA7CKW5:d3yDiRhYF22B57i5
Malware Config
Signatures
-
Dridex family
-
Processes:
resource yara_rule behavioral1/memory/1184-4-0x0000000002960000-0x0000000002961000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2720-1-0x000007FEF7B30000-0x000007FEF7C13000-memory.dmp dridex_payload behavioral1/memory/1184-19-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1184-27-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1184-38-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/1184-39-0x0000000140000000-0x00000001400E3000-memory.dmp dridex_payload behavioral1/memory/2720-47-0x000007FEF7B30000-0x000007FEF7C13000-memory.dmp dridex_payload behavioral1/memory/1224-60-0x000007FEF7BD0000-0x000007FEF7CB4000-memory.dmp dridex_payload behavioral1/memory/1224-64-0x000007FEF7BD0000-0x000007FEF7CB4000-memory.dmp dridex_payload behavioral1/memory/2772-76-0x000007FEF66A0000-0x000007FEF6784000-memory.dmp dridex_payload behavioral1/memory/2772-81-0x000007FEF66A0000-0x000007FEF6784000-memory.dmp dridex_payload behavioral1/memory/2804-93-0x000007FEF6230000-0x000007FEF6315000-memory.dmp dridex_payload behavioral1/memory/2804-97-0x000007FEF6230000-0x000007FEF6315000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
wscript.exeWindowsAnytimeUpgradeResults.exerrinstaller.exepid Process 1224 wscript.exe 2772 WindowsAnytimeUpgradeResults.exe 2804 rrinstaller.exe -
Loads dropped DLL 8 IoCs
Processes:
wscript.exeWindowsAnytimeUpgradeResults.exerrinstaller.exepid Process 1184 1184 1224 wscript.exe 1184 2772 WindowsAnytimeUpgradeResults.exe 1184 2804 rrinstaller.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Auwqk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\MAINTE~1\\ZsTKMZ\\WINDOW~1.EXE" -
Processes:
wscript.exeWindowsAnytimeUpgradeResults.exerrinstaller.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewscript.exepid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1224 wscript.exe 1224 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid Process procid_target PID 1184 wrote to memory of 2404 1184 30 PID 1184 wrote to memory of 2404 1184 30 PID 1184 wrote to memory of 2404 1184 30 PID 1184 wrote to memory of 1224 1184 31 PID 1184 wrote to memory of 1224 1184 31 PID 1184 wrote to memory of 1224 1184 31 PID 1184 wrote to memory of 2172 1184 32 PID 1184 wrote to memory of 2172 1184 32 PID 1184 wrote to memory of 2172 1184 32 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2772 1184 33 PID 1184 wrote to memory of 2792 1184 34 PID 1184 wrote to memory of 2792 1184 34 PID 1184 wrote to memory of 2792 1184 34 PID 1184 wrote to memory of 2804 1184 35 PID 1184 wrote to memory of 2804 1184 35 PID 1184 wrote to memory of 2804 1184 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b736eaf2c05ce53035ffd01e89966ec_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵PID:2404
-
C:\Users\Admin\AppData\Local\mYzL\wscript.exeC:\Users\Admin\AppData\Local\mYzL\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:2172
-
C:\Users\Admin\AppData\Local\w7m\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\w7m\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2772
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:2792
-
C:\Users\Admin\AppData\Local\n4kO6VGk5\rrinstaller.exeC:\Users\Admin\AppData\Local\n4kO6VGk5\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD572bd1938895152f81078aa9cb5db7b9b
SHA1265c560ef49dd3b551c25412c4a3eef397477907
SHA256a7e519500feaeab5e1d53c8d05d932d081b8df2119aa6eb0d2b39491ed176913
SHA512caee52b6aa33015c265a3ef4b22193606cf3ac1b7bf3542fafd5eb3e30958e70e8bb4d89aecad983af7608900fbc921540793878e914269626c6a7851f5588e9
-
Filesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
Filesize
916KB
MD51a0a9b993d56766e6ed2ef7c904f60c0
SHA1c4e4be11c783cc1cdb8deed433c502391f19ff53
SHA256134fe09e8f024e9b11590915bafdd085298fe628af56c34f8d7dbc0c6415866d
SHA5121eba4a5ce678eabfb1371a96b751eeb34b506f7d724cd92ae01bdae32120d1beaae0b2d5a33914ee2300b2ef314c4983664433148da1ef45de2d1c4ac451e47b
-
Filesize
912KB
MD5431e86e7040e643b10585de2601d9f8b
SHA1544ae0bbd0b358bb06db6565cc1747bbb0e73ae1
SHA256cc3f23865ab49e8a78b3bbbcf293042634256ae453f8db0c4c5b56e71e267f9f
SHA512804fe2f950c1e156295ab183b4d6a7a155bb7cdf81d394271e5a02067a37d96cf3866c9cc7f3b825468ffe498725d850aec47f73254f74191cb206237144208d
-
Filesize
974B
MD57f698250ab326d7a25a48dbab80595c3
SHA156b06ea562741b3a3398dbf883f3cd6e65d3d4f1
SHA2567ce01a7c4682da9acfa02440b1f7b6a17c44fedb0a3674872444a10f4bdb1b71
SHA51253031f5592669b0e385e0dd07dd19afb6026949bf717eea60d1825dbe8a82b68b710aaf68409b36476595bdde79b5471efffa7b17e8ea1eda272ca0faaa9c481
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e