Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
8e9f9da05dd2ec3af6e062a95b717291_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
8e9f9da05dd2ec3af6e062a95b717291_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
8e9f9da05dd2ec3af6e062a95b717291
-
SHA1
aa8f45c4f03a62d34bdeaba4e592da0ba794b443
-
SHA256
853e9859d31b351e3aa4d945f86649537f80d6f9eb5db5389d5e14fe96133ff8
-
SHA512
215faa588cdab93807a396c4521cc23068df128000c2c2d953638e39eeed79d085fba3ea46da136680513ee5907b4cd230f0fbe70840aded2d0578cca6eac674
-
SSDEEP
24576:XyTonNVlKTt/Q5ECvVP7hpJMvjtKpvPf9+m6kLRqgSyI:XyWRKTt/QlPVp3h9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000003030000-0x0000000003031000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SoundRecorder.exexpsrchvw.exevmicsvc.exepid process 2700 SoundRecorder.exe 2172 xpsrchvw.exe 1964 vmicsvc.exe -
Loads dropped DLL 7 IoCs
Processes:
SoundRecorder.exexpsrchvw.exevmicsvc.exepid process 1204 2700 SoundRecorder.exe 1204 2172 xpsrchvw.exe 1204 1964 vmicsvc.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\GDJD4pr\\xpsrchvw.exe" -
Processes:
SoundRecorder.exexpsrchvw.exevmicsvc.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoundRecorder.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2580 1204 SoundRecorder.exe PID 1204 wrote to memory of 2580 1204 SoundRecorder.exe PID 1204 wrote to memory of 2580 1204 SoundRecorder.exe PID 1204 wrote to memory of 2700 1204 SoundRecorder.exe PID 1204 wrote to memory of 2700 1204 SoundRecorder.exe PID 1204 wrote to memory of 2700 1204 SoundRecorder.exe PID 1204 wrote to memory of 1276 1204 xpsrchvw.exe PID 1204 wrote to memory of 1276 1204 xpsrchvw.exe PID 1204 wrote to memory of 1276 1204 xpsrchvw.exe PID 1204 wrote to memory of 2172 1204 xpsrchvw.exe PID 1204 wrote to memory of 2172 1204 xpsrchvw.exe PID 1204 wrote to memory of 2172 1204 xpsrchvw.exe PID 1204 wrote to memory of 812 1204 vmicsvc.exe PID 1204 wrote to memory of 812 1204 vmicsvc.exe PID 1204 wrote to memory of 812 1204 vmicsvc.exe PID 1204 wrote to memory of 1964 1204 vmicsvc.exe PID 1204 wrote to memory of 1964 1204 vmicsvc.exe PID 1204 wrote to memory of 1964 1204 vmicsvc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e9f9da05dd2ec3af6e062a95b717291_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SoundRecorder.exeC:\Windows\system32\SoundRecorder.exe1⤵
-
C:\Users\Admin\AppData\Local\VH98btt5\SoundRecorder.exeC:\Users\Admin\AppData\Local\VH98btt5\SoundRecorder.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\1oBDn41Su\xpsrchvw.exeC:\Users\Admin\AppData\Local\1oBDn41Su\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵
-
C:\Users\Admin\AppData\Local\S71Q\vmicsvc.exeC:\Users\Admin\AppData\Local\S71Q\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1oBDn41Su\WINMM.dllFilesize
1.2MB
MD53e2cd2851c536e832138b8ea369e14cd
SHA122b064ae68ffe7cb4b674754cc57b2f09b1e4d9f
SHA256471599f678678bbb29cade38c26e3e60df69cd9b1162dde404966a3dddfd7d75
SHA512be67a5bfebf854080bf2f7355983324e430ba7e1afceee70666cbcb05c621e38884baf674c355601515c9ba693bef343b80e07dff5115fd8a2b8610089276661
-
C:\Users\Admin\AppData\Local\S71Q\ACTIVEDS.dllFilesize
1.2MB
MD5bfdda244f9d59003f1f10577be8e5ad6
SHA131b2fae0a762e2cc418a1e255aa0477be03fad5b
SHA2563e66d128815ac3ce96b0676f42195af410ade0df583c1af17c34395d9c00bfa1
SHA5121cd814cb09bcf24ecb84f9076bdec88bf629cd3308d235e71a08ef8c7f94757b299dbc9927d3933196d449ea893b5829d6be46f5dbbea84b88cddc29ea301e88
-
C:\Users\Admin\AppData\Local\VH98btt5\UxTheme.dllFilesize
1.2MB
MD5899f504e1df6b3a295f09b57d82a5697
SHA1504f894d2fdadc706970ac23900f5f41a9deeed6
SHA256d7240b017b35c9eed997ef90287740d222288334756f7dbab83dca56a8a7f2e5
SHA5129cd47ee6084f0c1c655c7b6f2ab44333b37136ae58e330fff027b0cccce8e256d3afff5fcdfa302d819fa08864adce60ce0a29d4913fb80f7cfe626259377b66
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Qscjinkjzo.lnkFilesize
1KB
MD572a6657aa4f2761a6beab7159e7f6d2e
SHA1fae988b34f769573df7cb196daff32ec4b855c8a
SHA256256fb8d929e3ffd3f614d11bcc044c3523fff9626d63bcb273df879f7132667f
SHA51290d03dbfa41f2bd38af19280c0edefaade304ad715bea5a26448b8f38cba6692a23366cef7e59358b7d391b43aea58af6c553ce077b6f60f5650dc4d0b926895
-
\Users\Admin\AppData\Local\1oBDn41Su\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
\Users\Admin\AppData\Local\S71Q\vmicsvc.exeFilesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
\Users\Admin\AppData\Local\VH98btt5\SoundRecorder.exeFilesize
139KB
MD547f0f526ad4982806c54b845b3289de1
SHA18420ea488a2e187fe1b7fcfb53040d10d5497236
SHA256e81b11fe30b16fa4e3f08810513c245248adce8566355a8f2a19c63b1143ff5b
SHA5124c9a1aa5ed55087538c91a77d7420932263b69e59dc57b1db738e59624265b734bf29e2b6ed8d0adb2e0dec5763bfbf86876fd7d1139c21e829001c7868d515d
-
memory/1204-26-0x0000000002FE0000-0x0000000002FE7000-memory.dmpFilesize
28KB
-
memory/1204-16-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-4-0x00000000776D6000-0x00000000776D7000-memory.dmpFilesize
4KB
-
memory/1204-15-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-13-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-12-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-11-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-10-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-8-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-30-0x0000000077A70000-0x0000000077A72000-memory.dmpFilesize
8KB
-
memory/1204-29-0x00000000778E1000-0x00000000778E2000-memory.dmpFilesize
4KB
-
memory/1204-39-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-37-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-5-0x0000000003030000-0x0000000003031000-memory.dmpFilesize
4KB
-
memory/1204-25-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-14-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-72-0x00000000776D6000-0x00000000776D7000-memory.dmpFilesize
4KB
-
memory/1204-7-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1204-9-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/1964-94-0x0000000140000000-0x0000000140133000-memory.dmpFilesize
1.2MB
-
memory/2172-73-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2172-74-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/2172-78-0x0000000140000000-0x0000000140134000-memory.dmpFilesize
1.2MB
-
memory/2700-60-0x0000000140000000-0x0000000140133000-memory.dmpFilesize
1.2MB
-
memory/2700-55-0x0000000140000000-0x0000000140133000-memory.dmpFilesize
1.2MB
-
memory/2700-54-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/2984-46-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2984-0-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2984-3-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB