Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
e4902f86c9b70ba6a7a9d2b4a586e71a_JaffaCakes118.dll
Resource
win7-20240319-en
General
-
Target
e4902f86c9b70ba6a7a9d2b4a586e71a_JaffaCakes118.dll
-
Size
1.7MB
-
MD5
e4902f86c9b70ba6a7a9d2b4a586e71a
-
SHA1
d36c67f2596745f9882347df0db1dff5ad9829aa
-
SHA256
3631cc84e20f358d76f8a064c3abdd999e603e800a109e4251339d822cef7977
-
SHA512
fe037047831eae3dc4f7e2b6dec7e3e248733cb683299ad6923cfad19914deb021d73aa30d61c93002cfbf589682f1996bd019b70e568f74fc0b3bd0d902133c
-
SSDEEP
12288:dVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:EfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3352-5-0x0000000007E00000-0x0000000007E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Magnify.exeCloudNotifications.exeDWWIN.EXEpid process 4760 Magnify.exe 1384 CloudNotifications.exe 1048 DWWIN.EXE -
Loads dropped DLL 3 IoCs
Processes:
Magnify.exeCloudNotifications.exeDWWIN.EXEpid process 4760 Magnify.exe 1384 CloudNotifications.exe 1048 DWWIN.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ymojgrwdyxau = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\U9CgEpityP\\CloudNotifications.exe" -
Processes:
CloudNotifications.exeDWWIN.EXErundll32.exeMagnify.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 3352 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3352 3352 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3352 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3352 wrote to memory of 4040 3352 Magnify.exe PID 3352 wrote to memory of 4040 3352 Magnify.exe PID 3352 wrote to memory of 4760 3352 Magnify.exe PID 3352 wrote to memory of 4760 3352 Magnify.exe PID 3352 wrote to memory of 1588 3352 CloudNotifications.exe PID 3352 wrote to memory of 1588 3352 CloudNotifications.exe PID 3352 wrote to memory of 1384 3352 CloudNotifications.exe PID 3352 wrote to memory of 1384 3352 CloudNotifications.exe PID 3352 wrote to memory of 4736 3352 DWWIN.EXE PID 3352 wrote to memory of 4736 3352 DWWIN.EXE PID 3352 wrote to memory of 1048 3352 DWWIN.EXE PID 3352 wrote to memory of 1048 3352 DWWIN.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4902f86c9b70ba6a7a9d2b4a586e71a_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵
-
C:\Users\Admin\AppData\Local\U9q\Magnify.exeC:\Users\Admin\AppData\Local\U9q\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵
-
C:\Users\Admin\AppData\Local\02QG\CloudNotifications.exeC:\Users\Admin\AppData\Local\02QG\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵
-
C:\Users\Admin\AppData\Local\LOHr\DWWIN.EXEC:\Users\Admin\AppData\Local\LOHr\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\02QG\CloudNotifications.exeFilesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
C:\Users\Admin\AppData\Local\02QG\UxTheme.dllFilesize
1.7MB
MD5ac5fbb15cc2ca03558e2254bb1753bdf
SHA19432066a1002e2f9a53a5eb464b5146b35599b48
SHA2568ee5df8ae95dbd5e92ffc31efb77d603cae335b894ad2eec3283fe7a7a1e0898
SHA51278f9e3e36d9c1cc3f7ad7f539f851c016a6e6926d11bfe408eb3e71d9d60938eb3a510f40b8439243c1d870dc4b2ecbcde0e8171ab2d555231be30d40805429c
-
C:\Users\Admin\AppData\Local\LOHr\DWWIN.EXEFilesize
229KB
MD5444cc4d3422a0fdd45c1b78070026c60
SHA197162ff341fff1ec54b827ec02f8b86fd2d41a97
SHA2564b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0
SHA51221742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553
-
C:\Users\Admin\AppData\Local\LOHr\wer.dllFilesize
1.7MB
MD56937928319798b6eed9b712baac6558b
SHA170e67be28b637fce7b5e5a2e01aa59861861c991
SHA256cff3d22bf832fd7d8f375c2bcf584b4189f0da77ef2181c85c682b78ffdf828e
SHA5128531053330104dfec209adf587360fb0bfead3b3de36f4af3812c87ec5c159c8b56bdf534f885d1bd1cdef6c419dd1fbaf62629f98800d31b9fd2370532307e8
-
C:\Users\Admin\AppData\Local\U9q\MAGNIFICATION.dllFilesize
1.7MB
MD57c8dac3424eb7b093a05359ea728413f
SHA15b4793b19dfff298dea49251290c6d9dc7054b04
SHA256642b7a4e92d7fc2aa16374ce511913e7674634ffef66ea054283fe2b133ef199
SHA5121ce1c1170079145b0aad7006cd1ea487dcd70a3d7849bf85caa02d988e6a744a4c2f7a6bbfcb9bcd2830ea46ca4ff018e4450f65a54282c56bf7b46b20d0676d
-
C:\Users\Admin\AppData\Local\U9q\Magnify.exeFilesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Bgoltaavvu.lnkFilesize
1KB
MD5a5574f4e6e80e8ddd08408d871c70581
SHA119f6d24e6bfe852217cf3c19f5c9d2bb9d99a9b3
SHA2567ab529e74561990d4e6f0d483fcb9ee371874910d97f665f614d742a62710e81
SHA512e574b29f746b6df69da0ad5babd4674dbd1cab8c721735c146c5f8d6695fad1d84b9abde06f16f2236341d2c8a6fd78eea862649940a3a0e76ab73489fab9099
-
memory/628-1-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/628-3-0x000001EFA3900000-0x000001EFA3907000-memory.dmpFilesize
28KB
-
memory/628-9-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/628-0-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/1048-111-0x0000000140000000-0x00000001401AF000-memory.dmpFilesize
1.7MB
-
memory/1048-110-0x0000000140000000-0x00000001401AF000-memory.dmpFilesize
1.7MB
-
memory/1048-113-0x000001751A980000-0x000001751A987000-memory.dmpFilesize
28KB
-
memory/1048-118-0x0000000140000000-0x00000001401AF000-memory.dmpFilesize
1.7MB
-
memory/1384-94-0x0000020124600000-0x0000020124607000-memory.dmpFilesize
28KB
-
memory/1384-92-0x0000000140000000-0x00000001401AE000-memory.dmpFilesize
1.7MB
-
memory/1384-99-0x0000000140000000-0x00000001401AE000-memory.dmpFilesize
1.7MB
-
memory/3352-19-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-44-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-23-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-24-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-25-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-26-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-28-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-29-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-27-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-31-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-32-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-33-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-30-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-34-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-35-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-37-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-36-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-38-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-41-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-39-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-40-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-42-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-43-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-21-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-45-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-47-0x00000000027D0000-0x00000000027D7000-memory.dmpFilesize
28KB
-
memory/3352-53-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-57-0x00007FFB53BA0000-0x00007FFB53BB0000-memory.dmpFilesize
64KB
-
memory/3352-63-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-65-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-20-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-22-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-6-0x00007FFB51C5A000-0x00007FFB51C5B000-memory.dmpFilesize
4KB
-
memory/3352-5-0x0000000007E00000-0x0000000007E01000-memory.dmpFilesize
4KB
-
memory/3352-8-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-10-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-16-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-18-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-17-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-15-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-14-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-13-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-12-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/3352-11-0x0000000140000000-0x00000001401AD000-memory.dmpFilesize
1.7MB
-
memory/4760-81-0x0000000140000000-0x00000001401AE000-memory.dmpFilesize
1.7MB
-
memory/4760-74-0x0000000140000000-0x00000001401AE000-memory.dmpFilesize
1.7MB
-
memory/4760-75-0x0000000140000000-0x00000001401AE000-memory.dmpFilesize
1.7MB
-
memory/4760-76-0x000002E58FAA0000-0x000002E58FAA7000-memory.dmpFilesize
28KB