Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
73675d3e6348ef7b1be6cc67b90f6333
-
SHA1
1acb6cc9cb689cf8c28eb1df47c9d82ff194aacc
-
SHA256
f9596306e520a651e3f91e376df0211f2cf382a5b0e69b4900357abb3c6b7a7e
-
SHA512
bba7f9e8b727bcdb716f2c9d19fd03700d1c8d4f5055c3329a2e31f6c4068d7ea0cf31c1cb659b66c22875ff383ef1087f95a96977e51ee14e80d10f082eb688
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1224-5-0x0000000002910000-0x0000000002911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rrinstaller.exemstsc.exeSndVol.exepid process 2688 rrinstaller.exe 2648 mstsc.exe 1780 SndVol.exe -
Loads dropped DLL 7 IoCs
Processes:
rrinstaller.exemstsc.exeSndVol.exepid process 1224 2688 rrinstaller.exe 1224 2648 mstsc.exe 1224 1780 SndVol.exe 1224 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\pHVSMb\\mstsc.exe" -
Processes:
rundll32.exerrinstaller.exemstsc.exeSndVol.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1300 rundll32.exe 1300 rundll32.exe 1300 rundll32.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1224 wrote to memory of 2524 1224 rrinstaller.exe PID 1224 wrote to memory of 2524 1224 rrinstaller.exe PID 1224 wrote to memory of 2524 1224 rrinstaller.exe PID 1224 wrote to memory of 2688 1224 rrinstaller.exe PID 1224 wrote to memory of 2688 1224 rrinstaller.exe PID 1224 wrote to memory of 2688 1224 rrinstaller.exe PID 1224 wrote to memory of 2484 1224 mstsc.exe PID 1224 wrote to memory of 2484 1224 mstsc.exe PID 1224 wrote to memory of 2484 1224 mstsc.exe PID 1224 wrote to memory of 2648 1224 mstsc.exe PID 1224 wrote to memory of 2648 1224 mstsc.exe PID 1224 wrote to memory of 2648 1224 mstsc.exe PID 1224 wrote to memory of 964 1224 SndVol.exe PID 1224 wrote to memory of 964 1224 SndVol.exe PID 1224 wrote to memory of 964 1224 SndVol.exe PID 1224 wrote to memory of 1780 1224 SndVol.exe PID 1224 wrote to memory of 1780 1224 SndVol.exe PID 1224 wrote to memory of 1780 1224 SndVol.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73675d3e6348ef7b1be6cc67b90f6333_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\M2AtSp8sQ\rrinstaller.exeC:\Users\Admin\AppData\Local\M2AtSp8sQ\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵
-
C:\Users\Admin\AppData\Local\VUGhKMR\mstsc.exeC:\Users\Admin\AppData\Local\VUGhKMR\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵
-
C:\Users\Admin\AppData\Local\FwDO8\SndVol.exeC:\Users\Admin\AppData\Local\FwDO8\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\FwDO8\UxTheme.dllFilesize
1.2MB
MD5aa2659a9b386e0ae5b4a6872f86ecd8d
SHA1d7e273a52c5193dc2a625d2cfa70814acf0b00c7
SHA25651c53c8b5496a84311b16fdea2e639ebae82d04b436b572d98a6b0f3493cc885
SHA512fb95ad11b6e39b7fb04512a9cf6e15e2fab74d75ddd167af51568dd4e431dabde7655090f417cc252b84fdf58ee3d24a019e73b04079aa37bf613ba764019119
-
C:\Users\Admin\AppData\Local\M2AtSp8sQ\MFPlat.DLLFilesize
1.2MB
MD5b657e216eedef7ad068b1815065f8469
SHA118b456804c79427a83d0cec36f9c3e5ac953fc9b
SHA25620175de4dc75edaf738c3d329120cb98c9c351a628e8858b1fb6c64e908b4cfb
SHA51229e23784493fc8772eef2a87f033a315e2d911e6ea3ea8f44a9cd6b5e68150676a401aba3f3ba7f47ce2dc805da6cc680fc4c3e0ed835724a7fdcd15cb91f161
-
C:\Users\Admin\AppData\Local\VUGhKMR\credui.dllFilesize
1.2MB
MD5e4bfff935b2ffce68b40e3faff449c55
SHA1f2b4a5e6fc97602a101e23ef0bdb5e8e60eaeab9
SHA2561dca0d26231d2d0cff6227ef2924cd3834d069a9d204bbb0cea5e0776d5c9eda
SHA512d26f4bb1c3d443409faad15240dce4623a275f41f9b985c7f0504e4f1aeb91fbf80227fb0e254850a4f99e2778757d59d3a407e77c170bcb42913b18a849675d
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD5d3e9d1f93d6a0680ff6603920e1a078d
SHA10e58159258a31604493c0dc47a4f43c0d3b94c21
SHA25605790ef45bc9f53378e5205d2d1d2ec5574d3a175c7e5fd8f37550c246132933
SHA51294f27c1baf6837c26207140d6c4a7580d2e2b97c57960cf35cf861fbd839de32160b1d00483356e5f85ea6b0b99c9ffbc5bcd41779ced428e11b57674cf8ecd4
-
\Users\Admin\AppData\Local\FwDO8\SndVol.exeFilesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
\Users\Admin\AppData\Local\M2AtSp8sQ\rrinstaller.exeFilesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
\Users\Admin\AppData\Local\VUGhKMR\mstsc.exeFilesize
1.1MB
MD550f739538ef014b2e7ec59431749d838
SHA1b439762b8efe8cfb977e7374c11a7e4d8ed05eb3
SHA25685c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3
SHA51202e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8
-
memory/1224-26-0x00000000028F0000-0x00000000028F7000-memory.dmpFilesize
28KB
-
memory/1224-8-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-4-0x0000000076D36000-0x0000000076D37000-memory.dmpFilesize
4KB
-
memory/1224-15-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-14-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-13-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-12-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-11-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-9-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-28-0x0000000076FD0000-0x0000000076FD2000-memory.dmpFilesize
8KB
-
memory/1224-27-0x0000000076E41000-0x0000000076E42000-memory.dmpFilesize
4KB
-
memory/1224-5-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/1224-38-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-39-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-16-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-25-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-54-0x0000000076D36000-0x0000000076D37000-memory.dmpFilesize
4KB
-
memory/1224-7-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1224-10-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1300-33-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1300-0-0x0000000001BC0000-0x0000000001BC7000-memory.dmpFilesize
28KB
-
memory/1300-1-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/1780-96-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2648-73-0x0000000000380000-0x0000000000387000-memory.dmpFilesize
28KB
-
memory/2648-74-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2648-79-0x0000000140000000-0x0000000140144000-memory.dmpFilesize
1.3MB
-
memory/2688-61-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2688-56-0x0000000140000000-0x0000000140145000-memory.dmpFilesize
1.3MB
-
memory/2688-55-0x00000000001F0000-0x00000000001F7000-memory.dmpFilesize
28KB