Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_27161434e84e258ee09d7b472052965c.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_27161434e84e258ee09d7b472052965c.dll
-
Size
1.1MB
-
MD5
27161434e84e258ee09d7b472052965c
-
SHA1
8d3c14960b77a4796d7e1c44b48c4e06dfda645b
-
SHA256
c567bcfe50a6894d43a4b85b302b6f76dc6376d64eb60270e92617a20c5a789c
-
SHA512
53b593cf1065ce170a5b077ee5646398c74c57801785baed5fe2afe604abd3d870eee5d56cbdb7762f57a642da95c00833ce1fd1f4bb13fb97e56b48ac8c9b87
-
SSDEEP
12288:2dMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:wMIJxSDX3bqjhcfHk7MzH6z
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1196-4-0x00000000029F0000-0x00000000029F1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2436-0-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1196-51-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1196-63-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/1196-62-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/2436-71-0x0000000140000000-0x000000014011C000-memory.dmp dridex_payload behavioral1/memory/2676-81-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload behavioral1/memory/2676-85-0x0000000140000000-0x000000014011D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2676 slui.exe 296 dpapimig.exe 2788 msconfig.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2676 slui.exe 1196 Process not Found 296 dpapimig.exe 1196 Process not Found 2788 msconfig.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\TNGTRLAE\\Lx\\dpapimig.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2624 1196 Process not Found 31 PID 1196 wrote to memory of 2624 1196 Process not Found 31 PID 1196 wrote to memory of 2624 1196 Process not Found 31 PID 1196 wrote to memory of 2676 1196 Process not Found 32 PID 1196 wrote to memory of 2676 1196 Process not Found 32 PID 1196 wrote to memory of 2676 1196 Process not Found 32 PID 1196 wrote to memory of 1740 1196 Process not Found 33 PID 1196 wrote to memory of 1740 1196 Process not Found 33 PID 1196 wrote to memory of 1740 1196 Process not Found 33 PID 1196 wrote to memory of 296 1196 Process not Found 34 PID 1196 wrote to memory of 296 1196 Process not Found 34 PID 1196 wrote to memory of 296 1196 Process not Found 34 PID 1196 wrote to memory of 1476 1196 Process not Found 35 PID 1196 wrote to memory of 1476 1196 Process not Found 35 PID 1196 wrote to memory of 1476 1196 Process not Found 35 PID 1196 wrote to memory of 2788 1196 Process not Found 36 PID 1196 wrote to memory of 2788 1196 Process not Found 36 PID 1196 wrote to memory of 2788 1196 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_27161434e84e258ee09d7b472052965c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵PID:2624
-
C:\Users\Admin\AppData\Local\aegEgl\slui.exeC:\Users\Admin\AppData\Local\aegEgl\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2676
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:1740
-
C:\Users\Admin\AppData\Local\yBx\dpapimig.exeC:\Users\Admin\AppData\Local\yBx\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:296
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:1476
-
C:\Users\Admin\AppData\Local\4vg50Ht\msconfig.exeC:\Users\Admin\AppData\Local\4vg50Ht\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59fcf1d291f254dfe5993331fb71ba86c
SHA1fcd000e0ab527a00dd09a8c4889a9fc5ea8ad4d3
SHA256adc038cce48f4c7127a15462b46d39e8448e109d05bd633ad7e11ac4ed43dafc
SHA51249f485e10a4534144a403e2a75c84e01e3e228e32dcb2697d574f311f009ff6cd44a673e73fdeafe3109807ab3f8803225a4ceb013838b283b1b506693a87b28
-
Filesize
1.1MB
MD523d32286e5132601fbc0844effb35f1a
SHA1655d892c4eac547446806b29345a5f562675f2fa
SHA25600a99b7d77183c19613d71b4fc882d67f990873bffe9fa26f2aa5e1294ff09cc
SHA5121409fafabf137a328cedd553d03f5ff9b96f17489f9bac0a9cc1c243bca6832d9eea603e2e1ff46733fd419b43e35c2a859a5f13dd7a3960dd3561cf3b4eb4df
-
Filesize
1.3MB
MD515b774450c3d94f3525c1d7a014ce2f7
SHA1710ef8dd71fa91d8d6185fe5b1b48d7f7a744433
SHA256bc235000cd759e7d497c678323d8bd04856e66301dd93e044301eb8fea689c81
SHA512cfc442ad275f3ff8c0ad430c890f39f76c6babdb9174f5c4ace867d78a9ed98beb8813cc5c7fd7796a6023343dc3bc3030e7df06d708a23182c018d1aec14961
-
Filesize
1KB
MD5b923e5d64b12211d66fe8f42e8ca84a1
SHA19d1d2803928700d507a28aade2c076e81e2ff234
SHA256f106126fcad040ca5eec6ebc62d407da0d906ec6290b35c188a3982ab66b0ad1
SHA512a73ed69e734e00c3c330c6d943a694d10e229e7eaa2d082112ec72794260372bf65794574e603358115144df857ca833f3ec3a504df114f4e8b221fffbfe581c
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
Filesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
Filesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc