Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
8604774bbfe1f722a0064a287ae9309c_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
8604774bbfe1f722a0064a287ae9309c_JaffaCakes118.dll
-
Size
987KB
-
MD5
8604774bbfe1f722a0064a287ae9309c
-
SHA1
ff9d68148a3e3e1b55421ec68745ae1b3f09c3d1
-
SHA256
301841aaf350823c55016d1092ffe88785d5cd97263bc2eb025ef908dadef41a
-
SHA512
eafac14440bec2452c1b36edc82fa7e536433e1fcbe8f80cda4cfe7e5a9b4f4cb080189d61c826c1aa090105eb42e50101f7f56c777a062ab93d9d691e323e42
-
SSDEEP
24576:WVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:WV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1196-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
perfmon.exeStikyNot.exeWindowsAnytimeUpgradeResults.exepid process 2736 perfmon.exe 2316 StikyNot.exe 2100 WindowsAnytimeUpgradeResults.exe -
Loads dropped DLL 7 IoCs
Processes:
perfmon.exeStikyNot.exeWindowsAnytimeUpgradeResults.exepid process 1196 2736 perfmon.exe 1196 2316 StikyNot.exe 1196 2100 WindowsAnytimeUpgradeResults.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yyeybzteybdsbj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\31v\\StikyNot.exe" -
Processes:
rundll32.exeperfmon.exeStikyNot.exeWindowsAnytimeUpgradeResults.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StikyNot.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 2464 1196 perfmon.exe PID 1196 wrote to memory of 2464 1196 perfmon.exe PID 1196 wrote to memory of 2464 1196 perfmon.exe PID 1196 wrote to memory of 2736 1196 perfmon.exe PID 1196 wrote to memory of 2736 1196 perfmon.exe PID 1196 wrote to memory of 2736 1196 perfmon.exe PID 1196 wrote to memory of 2008 1196 StikyNot.exe PID 1196 wrote to memory of 2008 1196 StikyNot.exe PID 1196 wrote to memory of 2008 1196 StikyNot.exe PID 1196 wrote to memory of 2316 1196 StikyNot.exe PID 1196 wrote to memory of 2316 1196 StikyNot.exe PID 1196 wrote to memory of 2316 1196 StikyNot.exe PID 1196 wrote to memory of 3008 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 3008 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 3008 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2100 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2100 1196 WindowsAnytimeUpgradeResults.exe PID 1196 wrote to memory of 2100 1196 WindowsAnytimeUpgradeResults.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8604774bbfe1f722a0064a287ae9309c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵
-
C:\Users\Admin\AppData\Local\Yly\perfmon.exeC:\Users\Admin\AppData\Local\Yly\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\StikyNot.exeC:\Windows\system32\StikyNot.exe1⤵
-
C:\Users\Admin\AppData\Local\6aWJy\StikyNot.exeC:\Users\Admin\AppData\Local\6aWJy\StikyNot.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵
-
C:\Users\Admin\AppData\Local\GRi\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\GRi\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6aWJy\dwmapi.dllFilesize
988KB
MD527e4a3469bd7a8a49f6624ed1c7835d1
SHA17a17cb8aa777b5c1ab029ae4b20dc831bca6d8a4
SHA25607fc39d6dc18e6c308f27f004d05486bd7c2e987df738a762e32c7daaffb0e91
SHA512fb70a7bf8ae250a33ef0d01456081a860a71813e004eda2f20c46b97b762b195d2df3d26e6ec6f8a36d97e79f7061981c51bdfd9276e72c11c19579fa53182ad
-
C:\Users\Admin\AppData\Local\GRi\UxTheme.dllFilesize
989KB
MD5f801108c52b8ab3306c52ce022eecb8b
SHA12bfc596461f6f9a0129b32106ff4a20d0b0b7bd1
SHA256ea4bff07ac3cbc0d208e8068fe90f65b86c2246f87fc8ee2cc59e1828f4beb9b
SHA512a4b656b5c7465e321c4b2039a5d848358e9b7cae051d7380f8ffd61c1c318bcaa1a80505c8451acf709da18c8bc37e7d1649e284689d178ef8ced153b58f5c66
-
C:\Users\Admin\AppData\Local\GRi\WindowsAnytimeUpgradeResults.exeFilesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
C:\Users\Admin\AppData\Local\Yly\Secur32.dllFilesize
990KB
MD54492aaa43d0c6f0d3c26b347e71f6487
SHA1be20fc97e1803d6d2563f8edb6c21a28308fb3ff
SHA256416fc1008d07755a52dbbc481d4ff108bac6cdbb9bea5fcde44044a013a11cf6
SHA5128c9c30d2d6bb52d4e55d60de62922afa14ad000fd440595692720259c37770d2a94c0a95c3cf98054bf4ce0b65805ea091c7b339675f2d24115bf42117de5309
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Omdqupblcei.lnkFilesize
832B
MD5600a9f381a2c67e707a9b1bf08ec9426
SHA1dff0f8b0774dc248942441c630507ca021e47bdc
SHA25627b50b23b4bbeed68dd02407d26d60f2b83d0078f736a6e17c97041264a422ed
SHA512234342d40a69d07f8eb457c53955ecb3467745e4642034dac51f81347b3b8c165907869b537ba281159f2233ac1b6e28fa5de47e940a9410b56086079c39e839
-
\Users\Admin\AppData\Local\6aWJy\StikyNot.exeFilesize
417KB
MD5b22cb67919ebad88b0e8bb9cda446010
SHA1423a794d26d96d9f812d76d75fa89bffdc07d468
SHA2562f744feac48ede7d6b6d2727f7ddfa80b26d9e3b0009741b00992b19ad85e128
SHA512f40aad2a381b766aae0a353fae3ab759d5c536b2d00d135527bba37b601d2f24323f079bd09600355d79404d574ac59201d415ef64c1568877ad0ce0da2dd1d5
-
\Users\Admin\AppData\Local\Yly\perfmon.exeFilesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
memory/1196-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-28-0x0000000077D90000-0x0000000077D92000-memory.dmpFilesize
8KB
-
memory/1196-27-0x0000000077C01000-0x0000000077C02000-memory.dmpFilesize
4KB
-
memory/1196-23-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-4-0x00000000779F6000-0x00000000779F7000-memory.dmpFilesize
4KB
-
memory/1196-24-0x0000000002DE0000-0x0000000002DE7000-memory.dmpFilesize
28KB
-
memory/1196-5-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/1196-73-0x00000000779F6000-0x00000000779F7000-memory.dmpFilesize
4KB
-
memory/1196-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1196-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2100-94-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2104-3-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/2104-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2104-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2316-74-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2316-77-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2736-56-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2736-55-0x0000000000130000-0x0000000000137000-memory.dmpFilesize
28KB
-
memory/2736-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB