Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09024a26ea677d735c4a1e3041f73765.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_09024a26ea677d735c4a1e3041f73765.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_09024a26ea677d735c4a1e3041f73765.dll
-
Size
1.4MB
-
MD5
09024a26ea677d735c4a1e3041f73765
-
SHA1
f624aa4dc24cd5df1546737fed4da1bee587a279
-
SHA256
92a1adc462adbf747ec142eeeab2dc55aa0e809c678116fad23ea8c8a80ad1cf
-
SHA512
cfe7cc6a44a331b23eecc95af148e9f220b9ac5eb2b0dc241c29499f9f8d16124ff096c56161d824786034fc11ac054ca37e513494d5522505708fc7c3aa5160
-
SSDEEP
12288:ddMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:TMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1200-4-0x0000000002E50000-0x0000000002E51000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/1724-1-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/1200-51-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/1200-63-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/1200-62-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/1724-71-0x0000000140000000-0x0000000140163000-memory.dmp dridex_payload behavioral1/memory/2620-80-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload behavioral1/memory/2620-84-0x0000000140000000-0x0000000140164000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2620 BdeUISrv.exe 3000 rekeywiz.exe 880 psr.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2620 BdeUISrv.exe 1200 Process not Found 3000 rekeywiz.exe 1200 Process not Found 880 psr.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\HAHK6K3D\\11S\\rekeywiz.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 2620 BdeUISrv.exe 2620 BdeUISrv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1076 1200 Process not Found 31 PID 1200 wrote to memory of 1076 1200 Process not Found 31 PID 1200 wrote to memory of 1076 1200 Process not Found 31 PID 1200 wrote to memory of 2620 1200 Process not Found 32 PID 1200 wrote to memory of 2620 1200 Process not Found 32 PID 1200 wrote to memory of 2620 1200 Process not Found 32 PID 1200 wrote to memory of 844 1200 Process not Found 33 PID 1200 wrote to memory of 844 1200 Process not Found 33 PID 1200 wrote to memory of 844 1200 Process not Found 33 PID 1200 wrote to memory of 3000 1200 Process not Found 34 PID 1200 wrote to memory of 3000 1200 Process not Found 34 PID 1200 wrote to memory of 3000 1200 Process not Found 34 PID 1200 wrote to memory of 3004 1200 Process not Found 35 PID 1200 wrote to memory of 3004 1200 Process not Found 35 PID 1200 wrote to memory of 3004 1200 Process not Found 35 PID 1200 wrote to memory of 880 1200 Process not Found 36 PID 1200 wrote to memory of 880 1200 Process not Found 36 PID 1200 wrote to memory of 880 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09024a26ea677d735c4a1e3041f73765.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:1076
-
C:\Users\Admin\AppData\Local\nff\BdeUISrv.exeC:\Users\Admin\AppData\Local\nff\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:844
-
C:\Users\Admin\AppData\Local\nWqVQR\rekeywiz.exeC:\Users\Admin\AppData\Local\nWqVQR\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3000
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:3004
-
C:\Users\Admin\AppData\Local\QXdZ1v3Fv\psr.exeC:\Users\Admin\AppData\Local\QXdZ1v3Fv\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b0bdeed2b8324b1f75e453a5f7fa6b85
SHA1af603be76fed05db201ed22118797f84bf70248e
SHA256a78e09471ff38e0ffa4cc84a3f41591d9e3a60b8f6680311683f325f4b7313e6
SHA5129b493906554108364c84c03d13261368f6a207951b15136dfe94fc61c87832d987730106907c1b091321421a9b04211922c8af1de248d27473dcba5e23153f12
-
Filesize
1.4MB
MD5c43f7d0dba08a38272f905828a269606
SHA1494dbfd0b75f2087022ff9abb464128e39e81aca
SHA256af6d58f1b8ede34ac31a5888a346117454393312c7ef62d62864d6c91160c492
SHA512b4155411da3da6f0bd2e5086fad982f0a40cbc3d20e1274a9da9388eba8bec8908d0ec60edb8080685a7a6134685570c1ae59e3a486cdfbac947eafd08648ec7
-
Filesize
1.4MB
MD5d8c8cf93a1c0e723fe714e1839e0bf4f
SHA19c1bc362b00e12c65d2483dc515c1fd02c6594ab
SHA256423b56a9267f8398a6ef601a9210f27bbb1519b2e246a4a77327d1f250bb165e
SHA512b2573cd0e53a5dd9b7d0ceeae400e47b2035cd6bb1a747ea537d561376402b24c4b20f732d950d0b3c4ef40533a3779742d7b70ff87f4ccf8ed8ac8048f581b9
-
Filesize
1KB
MD54f96c919bbf9226532a47d73b6338725
SHA13e6ed61d278d2ae33a239a2d6bbefe9873e495a8
SHA2560a9453d1c1fae7af3354cbb167e14c7bba4099eb66da1a92a1d6aef5863688a5
SHA51223e3e5f69cbaa69eed47da7f091fdff9f96129ba07ff1ccb02c16ad4598a999694a00c6a1849c354eea205bcc5e5cd348f4686ae8c662637037d887c7083b325
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6