Analysis
-
max time kernel
121s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
99daf6981ed0868d09623c8463847c9a_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
99daf6981ed0868d09623c8463847c9a_JaffaCakes118.dll
-
Size
987KB
-
MD5
99daf6981ed0868d09623c8463847c9a
-
SHA1
ad9ce6e2dc54be25d7b23c8902a549a2897e2fef
-
SHA256
2f60124860d5be9579a4a37ed8e8800197f77dfa7292ea79215897aa1f5aa81a
-
SHA512
8e3b74ed0189f0528c398de4772e77c7b9019e1ed6a281bbd41663778990eb4a1d6ba0a0006e15a14e52d3a8d237f8c1981a1447a9a267de50aa8f1ffe776965
-
SSDEEP
24576:CVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:CV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-5-0x0000000002E20000-0x0000000002E21000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msdtc.exerrinstaller.exeDevicePairingWizard.exepid process 2464 msdtc.exe 2244 rrinstaller.exe 1580 DevicePairingWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
msdtc.exerrinstaller.exeDevicePairingWizard.exepid process 1188 2464 msdtc.exe 1188 2244 rrinstaller.exe 1188 1580 DevicePairingWizard.exe 1188 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\c1hP5i\\rrinstaller.exe" -
Processes:
rundll32.exemsdtc.exerrinstaller.exeDevicePairingWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1188 wrote to memory of 2488 1188 msdtc.exe PID 1188 wrote to memory of 2488 1188 msdtc.exe PID 1188 wrote to memory of 2488 1188 msdtc.exe PID 1188 wrote to memory of 2464 1188 msdtc.exe PID 1188 wrote to memory of 2464 1188 msdtc.exe PID 1188 wrote to memory of 2464 1188 msdtc.exe PID 1188 wrote to memory of 2324 1188 rrinstaller.exe PID 1188 wrote to memory of 2324 1188 rrinstaller.exe PID 1188 wrote to memory of 2324 1188 rrinstaller.exe PID 1188 wrote to memory of 2244 1188 rrinstaller.exe PID 1188 wrote to memory of 2244 1188 rrinstaller.exe PID 1188 wrote to memory of 2244 1188 rrinstaller.exe PID 1188 wrote to memory of 2440 1188 DevicePairingWizard.exe PID 1188 wrote to memory of 2440 1188 DevicePairingWizard.exe PID 1188 wrote to memory of 2440 1188 DevicePairingWizard.exe PID 1188 wrote to memory of 1580 1188 DevicePairingWizard.exe PID 1188 wrote to memory of 1580 1188 DevicePairingWizard.exe PID 1188 wrote to memory of 1580 1188 DevicePairingWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99daf6981ed0868d09623c8463847c9a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\Qgqpz9kmV\msdtc.exeC:\Users\Admin\AppData\Local\Qgqpz9kmV\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\qnyzB\rrinstaller.exeC:\Users\Admin\AppData\Local\qnyzB\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\8gQP\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\8gQP\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8gQP\DevicePairingWizard.exeFilesize
73KB
MD59728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
C:\Users\Admin\AppData\Local\Qgqpz9kmV\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
C:\Users\Admin\AppData\Local\qnyzB\MFPlat.DLLFilesize
992KB
MD5635b7136675b9d78b6407dd4cd567300
SHA15c57931b20a5875f26c7661ddc6c7b779e4c5a12
SHA256dfc95451ef5c152ed3b5b94b915cda0ef0a9d505a0f75e59b1f6612019334375
SHA5122738dd57b69a166165373b82d84dee2d3f19fbd96ce785a419322f58e06754c1a12a785b7d59b5334d1cf1b32c7a1d46f0cf0b54e621939d280e625ba0ff3606
-
C:\Users\Admin\AppData\Local\qnyzB\rrinstaller.exeFilesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Qscjinkjzo.lnkFilesize
1KB
MD5afd1c4f9202e92a762a39f5d67af752b
SHA1da8f7a68ae9ec4049bd13dddaa0fa2fbcdbc502d
SHA25661c0938d7bb9d9e6d513ca8283e9b338dad6042cd55af9390e6248b305dd4a7f
SHA512264d9db802469b785c984e6903d7ff88911bf45eb0bad5fb57b4743cab5c4ae7b156caf96f4d876d5bd15127ab8b5007ad9fcf13e16cdf06cc12994467e16f23
-
\Users\Admin\AppData\Local\8gQP\MFC42u.dllFilesize
1014KB
MD54087da50a811d23279a60f75f8e1b571
SHA1af89a31abec0074fece6e3db0066d87bcc0c49b1
SHA256cba83eadb420350639d0505f7d2930897737cdc46730157f91d5b5abf94e6b3c
SHA512cdd9bbd82398bf8eacb1497079bd253bbd4ebb4f13f901f72dd31a45635e62d81929d716dcd53acd56ec2ab79921579b8d0b48ce0dc7ff56938eb54e408b2c86
-
\Users\Admin\AppData\Local\Qgqpz9kmV\VERSION.dllFilesize
987KB
MD57432e227141263e3c186eae6a98dcc59
SHA15dabdf87b9e6a49b3c9ccc6584f0a38873d3a3d9
SHA256547eec79540f90507499c4e4c29efae4b7e331606ac359f7af3883d8ae7c0086
SHA512d1a4f30e137480f974197f6eb3d6bce06c722b3dd6d43621e3a50b3ffc69e209357cb91a37243a3a11066fbad7764c746a505f352c8927b04d97a904e85919f6
-
memory/1188-14-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-8-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-35-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-24-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-18-0x0000000002E00000-0x0000000002E07000-memory.dmpFilesize
28KB
-
memory/1188-12-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-11-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-10-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-9-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-36-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-5-0x0000000002E20000-0x0000000002E21000-memory.dmpFilesize
4KB
-
memory/1188-13-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1188-28-0x00000000777F0000-0x00000000777F2000-memory.dmpFilesize
8KB
-
memory/1188-25-0x0000000077661000-0x0000000077662000-memory.dmpFilesize
4KB
-
memory/1188-4-0x0000000077456000-0x0000000077457000-memory.dmpFilesize
4KB
-
memory/1188-62-0x0000000077456000-0x0000000077457000-memory.dmpFilesize
4KB
-
memory/1188-7-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1580-92-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1580-90-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1580-87-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/1656-44-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/1656-3-0x0000000000320000-0x0000000000327000-memory.dmpFilesize
28KB
-
memory/1656-0-0x0000000140000000-0x00000001400FC000-memory.dmpFilesize
1008KB
-
memory/2244-70-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/2244-71-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2244-75-0x0000000140000000-0x00000001400FE000-memory.dmpFilesize
1016KB
-
memory/2464-52-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2464-57-0x0000000140000000-0x00000001400FD000-memory.dmpFilesize
1012KB
-
memory/2464-55-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB