Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 08:05
Static task
static1
Behavioral task
behavioral1
Sample
ecf41eed01b51896a22420497a67777d_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
ecf41eed01b51896a22420497a67777d_JaffaCakes118.dll
-
Size
2.9MB
-
MD5
ecf41eed01b51896a22420497a67777d
-
SHA1
1c960b966c49ce5f8c30676469f5ba470e3d1706
-
SHA256
57f113bc0d460ba8e1749e7f6adce5d8c895516b193bbe9ae6395e26e8b9273e
-
SHA512
205ce72c7fca3bd646995d2a5ffad654e2f91516a1f729fd9b06aace74bddda06a95b50c000edcc57678072fed18eabfbefd165a7c552fe2cffdbf48c63824c2
-
SSDEEP
12288:7VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:afP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3504-4-0x0000000000FB0000-0x0000000000FB1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SysResetErr.exesessionmsg.exephoneactivate.exepid process 688 SysResetErr.exe 4588 sessionmsg.exe 3684 phoneactivate.exe -
Loads dropped DLL 3 IoCs
Processes:
SysResetErr.exesessionmsg.exephoneactivate.exepid process 688 SysResetErr.exe 4588 sessionmsg.exe 3684 phoneactivate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gtqmevpaxfwfnf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CTLs\\DOz\\sessionmsg.exe" -
Processes:
rundll32.exeSysResetErr.exesessionmsg.exephoneactivate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3504 wrote to memory of 1636 3504 SysResetErr.exe PID 3504 wrote to memory of 1636 3504 SysResetErr.exe PID 3504 wrote to memory of 688 3504 SysResetErr.exe PID 3504 wrote to memory of 688 3504 SysResetErr.exe PID 3504 wrote to memory of 4088 3504 sessionmsg.exe PID 3504 wrote to memory of 4088 3504 sessionmsg.exe PID 3504 wrote to memory of 4588 3504 sessionmsg.exe PID 3504 wrote to memory of 4588 3504 sessionmsg.exe PID 3504 wrote to memory of 4912 3504 phoneactivate.exe PID 3504 wrote to memory of 4912 3504 phoneactivate.exe PID 3504 wrote to memory of 3684 3504 phoneactivate.exe PID 3504 wrote to memory of 3684 3504 phoneactivate.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ecf41eed01b51896a22420497a67777d_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵
-
C:\Users\Admin\AppData\Local\y80e\SysResetErr.exeC:\Users\Admin\AppData\Local\y80e\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵
-
C:\Users\Admin\AppData\Local\XuvDQMCK\sessionmsg.exeC:\Users\Admin\AppData\Local\XuvDQMCK\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵
-
C:\Users\Admin\AppData\Local\jMxPPBik\phoneactivate.exeC:\Users\Admin\AppData\Local\jMxPPBik\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\XuvDQMCK\DUser.dllFilesize
2.9MB
MD5044da909479745fad833cbceddf14be6
SHA1f29b5a0e1efa65f8134057ef836a240ded2561ed
SHA256cd53f5f2e1c4956937d09742da7cea8dd648008762e6c3068f3a58efd72e231f
SHA51242780d8df01422dc80ccc4b11d9709a8d0e8011a10fcc335ef187de6a968992ba3451104bf611bcbf72b26c2b87de1985b8035b07f42d8446d2de11bc17cc2c0
-
C:\Users\Admin\AppData\Local\XuvDQMCK\sessionmsg.exeFilesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
C:\Users\Admin\AppData\Local\jMxPPBik\SLC.dllFilesize
2.9MB
MD55a24a380511d4f7e38c16357c3d11bd0
SHA1b4e3e28dc2e51e9d147896cf37ea994865a6a76f
SHA256b7ca1d0e15b97880cea0b016ca6633be8ae3f5dc694cf9f7583d90fed4e2010d
SHA51255eafd3e8aff59773824706aa1c3b0e04f87a0658a9b7ab5fdc411de3783dcd01356353df93f29d8c71666074f13a8eb74d23d852f4b666f6cd217dfe918dfe4
-
C:\Users\Admin\AppData\Local\jMxPPBik\phoneactivate.exeFilesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
C:\Users\Admin\AppData\Local\y80e\DUI70.dllFilesize
3.2MB
MD5bc8f118b257d3bc4f14e0b149ab53975
SHA122ebb4f31e4a2d737c271f72a9fee7ecf0f7b23e
SHA25630341dcab0ab1f70aebd9e2337ae039ec99d4c4b0ea646a1ba8aeacc89384677
SHA512bd555b524ef520123e0e07855b795730237d1255c6935c49d5b142d5c526235cf4a8f91730830ebfc64eba8405a0592f0cfa4f0c9366ccf7d9fd37f0b99525f3
-
C:\Users\Admin\AppData\Local\y80e\SysResetErr.exeFilesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Qielivq.lnkFilesize
1KB
MD5557c262accc0aa9d77fc802d40480e4f
SHA1939c8d3afbecf0daf3b5c54c474079608c9aac67
SHA256107cf7b60e5f917b2e09c620d6010a908429566afa28bf84224b532edbdab14e
SHA5126fa950514ffce79de8c4905bd0a54fbf4998b3635a6a10e2e47305f3b59020a0fedadfcb8582873492d19647206297d24770d70da65a4f1c7e23cdc57d65b3e5
-
memory/688-100-0x00000217A31A0000-0x00000217A31A7000-memory.dmpFilesize
28KB
-
memory/2572-0-0x000001540C7F0000-0x000001540C7F7000-memory.dmpFilesize
28KB
-
memory/2572-1-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/2572-8-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-35-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-41-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-12-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-13-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-14-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-15-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-16-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-17-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-18-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-19-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-20-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-21-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-22-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-23-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-24-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-25-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-26-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-27-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-29-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-28-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-30-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-32-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-31-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-33-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-34-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-11-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-36-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-37-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-38-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-39-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-40-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-7-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-42-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-43-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-44-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-45-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-46-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-47-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-48-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-50-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-49-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-51-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-53-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-54-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-52-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-55-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-58-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-56-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-57-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-59-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-60-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-62-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-61-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-63-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-10-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-65-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-64-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-71-0x0000000000F60000-0x0000000000F67000-memory.dmpFilesize
28KB
-
memory/3504-79-0x00007FFF93D60000-0x00007FFF93D70000-memory.dmpFilesize
64KB
-
memory/3504-5-0x00007FFF91E3A000-0x00007FFF91E3B000-memory.dmpFilesize
4KB
-
memory/3504-9-0x0000000140000000-0x00000001402E1000-memory.dmpFilesize
2.9MB
-
memory/3504-4-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/3684-133-0x00000268E0060000-0x00000268E0067000-memory.dmpFilesize
28KB
-
memory/4588-116-0x000001E0B7930000-0x000001E0B7937000-memory.dmpFilesize
28KB