Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
a5074c49ab453feff2d948de6af25275_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
a5074c49ab453feff2d948de6af25275_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
a5074c49ab453feff2d948de6af25275
-
SHA1
099a358c3c87ff9a7cd4f236a31ffd3a2813ffdf
-
SHA256
5e7128b9f307672c789131c566326f4321f8544d6107f68f85bc8b217728fff8
-
SHA512
af7c7949656ac3d71b37a0c5810cfc22234a049a43446f5699a6ca21fb051cd6812783ddedd6fc2c034a3f1916365ee6a3d0b3a20b8105ff577d9b44e13ac02f
-
SSDEEP
24576:guYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NiO:w9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1216-5-0x0000000002970000-0x0000000002971000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
lpksetup.exeSystemPropertiesHardware.execttune.exepid process 2548 lpksetup.exe 520 SystemPropertiesHardware.exe 2828 cttune.exe -
Loads dropped DLL 7 IoCs
Processes:
lpksetup.exeSystemPropertiesHardware.execttune.exepid process 1216 2548 lpksetup.exe 1216 520 SystemPropertiesHardware.exe 1216 2828 cttune.exe 1216 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gqwtkfbnxxlbs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\BaFEQ\\SystemPropertiesHardware.exe" -
Processes:
SystemPropertiesHardware.execttune.exelpksetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2852 regsvr32.exe 2852 regsvr32.exe 2852 regsvr32.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1216 wrote to memory of 2480 1216 lpksetup.exe PID 1216 wrote to memory of 2480 1216 lpksetup.exe PID 1216 wrote to memory of 2480 1216 lpksetup.exe PID 1216 wrote to memory of 2548 1216 lpksetup.exe PID 1216 wrote to memory of 2548 1216 lpksetup.exe PID 1216 wrote to memory of 2548 1216 lpksetup.exe PID 1216 wrote to memory of 580 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 580 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 580 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 520 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 520 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 520 1216 SystemPropertiesHardware.exe PID 1216 wrote to memory of 2856 1216 cttune.exe PID 1216 wrote to memory of 2856 1216 cttune.exe PID 1216 wrote to memory of 2856 1216 cttune.exe PID 1216 wrote to memory of 2828 1216 cttune.exe PID 1216 wrote to memory of 2828 1216 cttune.exe PID 1216 wrote to memory of 2828 1216 cttune.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a5074c49ab453feff2d948de6af25275_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\3Xf\lpksetup.exeC:\Users\Admin\AppData\Local\3Xf\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\CVchcwK0\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\CVchcwK0\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵
-
C:\Users\Admin\AppData\Local\ZekEIVqHC\cttune.exeC:\Users\Admin\AppData\Local\ZekEIVqHC\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\3Xf\lpksetup.exeFilesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
C:\Users\Admin\AppData\Local\3Xf\slc.dllFilesize
1.2MB
MD51891df1b6a4bbdb9eae315ab295e43b5
SHA153481dfc956f1b9bd73ea286c6ae50f29c8cb646
SHA25652d7b164020c7690c022f3c368189fcaacb1413ba65019526f05dff8fbe1b38a
SHA512aa83ed0d18237b33ebe3218db732a1fbb78fe305d0441ea6a96912fdad13ccc7ae77fcdef7d15e4504b0a018f84a8d4d2e6eb246c9d6db3cb3bf423f595c6cc9
-
C:\Users\Admin\AppData\Local\CVchcwK0\SYSDM.CPLFilesize
1.2MB
MD5a7c2cf8f6599a8aecf731ec86f56d561
SHA1565a18513e522c2bd9edee00dca791a23d14811d
SHA25678ca99ffb7a5a934f6708e9c7a0b31f4a38c7ef97f0fa769ba2f52c303b6cb6b
SHA51275519ed3c5f9015425be41782e4e3f50188f61394d13eaf6d2eb2d176d380dc26335b18c2e628c3b12facf1d1a2ba945a761b8f646f4fa0814d6286fa8a9663b
-
C:\Users\Admin\AppData\Local\CVchcwK0\SystemPropertiesHardware.exeFilesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
C:\Users\Admin\AppData\Local\ZekEIVqHC\OLEACC.dllFilesize
1.2MB
MD55995f41faf5c3d46c7b992794619462b
SHA1227386c64520ae8156ce15b60b0325bcb15d5ac8
SHA256f2b849daf2e034820e772d5ffbf8ece01e111598be230f814860de0fa0d9ab2c
SHA51261cf3be1c77ff3a9a341f08860b4b00b492456c73a9789a2d978000befd1d5a95984782733e1fa90a43451e720b932adf7cd66d041d8740907f869fd1eda3584
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Egmip.lnkFilesize
1KB
MD5ec072aaaf0308165eec1217f8daac1bc
SHA1062fa10db1c78376907f73107093bfbeec74c0dc
SHA2565982d0373eb510fd06bd5b8f7da333397a53e5d81e97ddf9abf7c26d2a72bdb5
SHA512b54d2e1739a46a5586fa6ee41caafa3b194dafefe386810d2540af2082841e175627ad5c3e324635ba1e67bc52f73017e21e1d8d6993ac6c98ae0f55628da981
-
\Users\Admin\AppData\Local\ZekEIVqHC\cttune.exeFilesize
314KB
MD57116848fd23e6195fcbbccdf83ce9af4
SHA135fb16a0b68f8a84d5dfac8c110ef5972f1bee93
SHA25639937665f72725bdb3b82389a5dbd906c63f4c14208312d7f7a59d6067e1cfa6
SHA512e38bf57eee5836b8598dd88dc3d266f497d911419a8426f73df6dcaa503611a965aabbd746181cb19bc38eebdb48db778a17f781a8f9e706cbd7a6ebec38f894
-
memory/520-77-0x000007FEF67E0000-0x000007FEF691B000-memory.dmpFilesize
1.2MB
-
memory/520-71-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/520-72-0x000007FEF67E0000-0x000007FEF691B000-memory.dmpFilesize
1.2MB
-
memory/1216-18-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-19-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-16-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-15-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-14-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-13-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-12-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-11-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-10-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-9-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-8-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-4-0x00000000776F6000-0x00000000776F7000-memory.dmpFilesize
4KB
-
memory/1216-37-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-36-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-5-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/1216-17-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-7-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-32-0x0000000077A90000-0x0000000077A92000-memory.dmpFilesize
8KB
-
memory/1216-31-0x0000000077901000-0x0000000077902000-memory.dmpFilesize
4KB
-
memory/1216-63-0x00000000776F6000-0x00000000776F7000-memory.dmpFilesize
4KB
-
memory/1216-27-0x0000000140000000-0x000000014013A000-memory.dmpFilesize
1.2MB
-
memory/1216-28-0x0000000002950000-0x0000000002957000-memory.dmpFilesize
28KB
-
memory/2548-58-0x000007FEF6F60000-0x000007FEF709B000-memory.dmpFilesize
1.2MB
-
memory/2548-53-0x000007FEF6F60000-0x000007FEF709B000-memory.dmpFilesize
1.2MB
-
memory/2548-52-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2828-89-0x0000000000280000-0x0000000000287000-memory.dmpFilesize
28KB
-
memory/2828-95-0x000007FEF67E0000-0x000007FEF691B000-memory.dmpFilesize
1.2MB
-
memory/2852-0-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/2852-33-0x000007FEF6F60000-0x000007FEF709A000-memory.dmpFilesize
1.2MB
-
memory/2852-1-0x000007FEF6F60000-0x000007FEF709A000-memory.dmpFilesize
1.2MB