Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
4de1802eeeb526cee64cf6946d1bdc4a_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
4de1802eeeb526cee64cf6946d1bdc4a_JaffaCakes118.dll
-
Size
994KB
-
MD5
4de1802eeeb526cee64cf6946d1bdc4a
-
SHA1
79f7ba91361abcca592416d8b408c83249b40547
-
SHA256
e167ea16a662e535c35f519dc669ea9ce70c91bff456e0fd6738fb62ea42fb2c
-
SHA512
11ede8d741dd2a7ee9c3d32800ac88a8075bf4b9dce83ede1f9285bb5b9acf80455564428d9f1599d505b2e8a8e7fa1bcef5983a2675e2ff7d0eb6a6b44fbbd6
-
SSDEEP
24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-5-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
slui.exemmc.exetcmsetup.exepid process 2784 slui.exe 2524 mmc.exe 2440 tcmsetup.exe -
Loads dropped DLL 7 IoCs
Processes:
slui.exemmc.exetcmsetup.exepid process 1184 2784 slui.exe 1184 2524 mmc.exe 1184 2440 tcmsetup.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqdbvnnwgmqj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\ACCESS~1\\AQYCLJ~1\\mmc.exe" -
Processes:
rundll32.exeslui.exemmc.exetcmsetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1184 wrote to memory of 2472 1184 slui.exe PID 1184 wrote to memory of 2472 1184 slui.exe PID 1184 wrote to memory of 2472 1184 slui.exe PID 1184 wrote to memory of 2784 1184 slui.exe PID 1184 wrote to memory of 2784 1184 slui.exe PID 1184 wrote to memory of 2784 1184 slui.exe PID 1184 wrote to memory of 2480 1184 mmc.exe PID 1184 wrote to memory of 2480 1184 mmc.exe PID 1184 wrote to memory of 2480 1184 mmc.exe PID 1184 wrote to memory of 2524 1184 mmc.exe PID 1184 wrote to memory of 2524 1184 mmc.exe PID 1184 wrote to memory of 2524 1184 mmc.exe PID 1184 wrote to memory of 1444 1184 tcmsetup.exe PID 1184 wrote to memory of 1444 1184 tcmsetup.exe PID 1184 wrote to memory of 1444 1184 tcmsetup.exe PID 1184 wrote to memory of 2440 1184 tcmsetup.exe PID 1184 wrote to memory of 2440 1184 tcmsetup.exe PID 1184 wrote to memory of 2440 1184 tcmsetup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4de1802eeeb526cee64cf6946d1bdc4a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵
-
C:\Users\Admin\AppData\Local\B38zovd\slui.exeC:\Users\Admin\AppData\Local\B38zovd\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵
-
C:\Users\Admin\AppData\Local\Hrmk\mmc.exeC:\Users\Admin\AppData\Local\Hrmk\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵
-
C:\Users\Admin\AppData\Local\uyE30p\tcmsetup.exeC:\Users\Admin\AppData\Local\uyE30p\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\B38zovd\slc.dllFilesize
995KB
MD5370e136fd73f1a5fa8bee39fb2473ce6
SHA15f80221b29e926b1a75182d431a223c8890a4c98
SHA256ab69fbb72dccc0c38552c580dd6561c9977da99458de7ef1ae2a7901b035a03e
SHA512769ccae85683e75b55545e789b18dbde5d0682c41eea3f822585548ffa7008fdf7649cef2bc7bccee109456c5ceac3605bb31e13f8976f3eceb61c556fc41dad
-
C:\Users\Admin\AppData\Local\Hrmk\UxTheme.dllFilesize
996KB
MD51603bd60b136e0ccf3052f1828fbf72d
SHA1f2e89719a2330060ffcf6e35aaeb8e52b9588bd9
SHA256da435f2949c32006264fd310a3d8d4793e70e8cc8321e751cde6e9eabc0dec0f
SHA5127c4614283ed2a2d986032c7cf9aa4845d151c36ac92f3e4d144ed0b75c3df881c3b54020b1ea4871b5d43165f07585f336e42c804e884a1747b9177f97c73eee
-
C:\Users\Admin\AppData\Local\uyE30p\TAPI32.dllFilesize
1002KB
MD5d6772a5261849a58dda86a7760a598da
SHA187796c230bbe98cb7ab5955e60ffc3296592107e
SHA25626a962eae9bd5b948c22a10eeefb31cab9d78f1f5ee6c5b9dbe24bb7985fc9bb
SHA5127523d5c94b859a37a435051ac46368a3f6ea3773c41635ad8f5d310064529a3984d82a89fb1f2256bf35fb1c9a7779dbc7fa45ee1ed53048786c374f88b99817
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Gemerzbimpg.lnkFilesize
1KB
MD52f6eabe1ef0503304576b0df0cedff19
SHA1868628adc12b9f49ae9acabdcbc7b23ba38274e5
SHA256774f2efabbb18b2f12c447b1ce48fc7329af934c6884721e2a0908b09b79ce2b
SHA5128533f947c5ada60d141f47806557915540665f97395fc83dac8c8a659da56be1479697e3699a6b401081dafe6955aed191fa086594132367c4fc9c1d5f1aec05
-
\Users\Admin\AppData\Local\B38zovd\slui.exeFilesize
341KB
MD5c5ce5ce799387e82b7698a0ee5544a6d
SHA1ed37fdb169bb539271c117d3e8a5f14fd8df1c0d
SHA25634aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c
SHA51279453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c
-
\Users\Admin\AppData\Local\Hrmk\mmc.exeFilesize
2.0MB
MD59fea051a9585f2a303d55745b4bf63aa
SHA1f5dc12d658402900a2b01af2f018d113619b96b8
SHA256b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484
SHA512beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76
-
\Users\Admin\AppData\Local\uyE30p\tcmsetup.exeFilesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
memory/1184-36-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-13-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-25-0x0000000076E31000-0x0000000076E32000-memory.dmpFilesize
4KB
-
memory/1184-24-0x0000000002D90000-0x0000000002D97000-memory.dmpFilesize
28KB
-
memory/1184-23-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-12-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-11-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-10-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-9-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-4-0x0000000076C26000-0x0000000076C27000-memory.dmpFilesize
4KB
-
memory/1184-35-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-5-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB
-
memory/1184-14-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-28-0x0000000076FC0000-0x0000000076FC2000-memory.dmpFilesize
8KB
-
memory/1184-8-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-7-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/1184-63-0x0000000076C26000-0x0000000076C27000-memory.dmpFilesize
4KB
-
memory/2420-44-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2420-1-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2420-3-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2440-89-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2440-92-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/2440-95-0x0000000140000000-0x00000001400FF000-memory.dmpFilesize
1020KB
-
memory/2524-71-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB
-
memory/2524-77-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2784-58-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2784-55-0x00000000001B0000-0x00000000001B7000-memory.dmpFilesize
28KB
-
memory/2784-52-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB