Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
f7edf14bfa55dd4235c32177c4cba776_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
f7edf14bfa55dd4235c32177c4cba776_JaffaCakes118.dll
-
Size
868KB
-
MD5
f7edf14bfa55dd4235c32177c4cba776
-
SHA1
ba1bbfca1c2e05f1ae2c3390e97acbde99e28f2a
-
SHA256
2044e2521531c1a0b7f8f2d22ac397bd632c2985e2c1e1d479bb2dcc35f9b094
-
SHA512
9bb89ce389c05868b8b067fa2bff1303a474a79a15b33d77ac0ffb155ae10ba3cc9fabf0c6dcca8d830fde9760e030b9631587226876fe42a7bafa61646dc435
-
SSDEEP
12288:LkbQEkWqv+157EYfxarhwLNuR7ek1tHffB/HzTyNQ6NIeGYr/R:LkbHkWfzZ5adwLNGeStHntqN7v
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3276-3-0x0000000002820000-0x0000000002821000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4140-0-0x00007FFAA22F0000-0x00007FFAA23C9000-memory.dmp dridex_payload behavioral2/memory/3276-24-0x0000000140000000-0x00000001400D9000-memory.dmp dridex_payload behavioral2/memory/3276-31-0x0000000140000000-0x00000001400D9000-memory.dmp dridex_payload behavioral2/memory/3276-42-0x0000000140000000-0x00000001400D9000-memory.dmp dridex_payload behavioral2/memory/4140-45-0x00007FFAA22F0000-0x00007FFAA23C9000-memory.dmp dridex_payload behavioral2/memory/1232-53-0x00007FFA929C0000-0x00007FFA92ADF000-memory.dmp dridex_payload behavioral2/memory/1232-57-0x00007FFA929C0000-0x00007FFA92ADF000-memory.dmp dridex_payload behavioral2/memory/2172-68-0x00007FFA92AA0000-0x00007FFA92B7B000-memory.dmp dridex_payload behavioral2/memory/2172-73-0x00007FFA92AA0000-0x00007FFA92B7B000-memory.dmp dridex_payload behavioral2/memory/4744-84-0x00007FFA92AA0000-0x00007FFA92B7A000-memory.dmp dridex_payload behavioral2/memory/4744-89-0x00007FFA92AA0000-0x00007FFA92B7A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
phoneactivate.exeRdpSa.exeCloudNotifications.exepid process 1232 phoneactivate.exe 2172 RdpSa.exe 4744 CloudNotifications.exe -
Loads dropped DLL 3 IoCs
Processes:
phoneactivate.exeRdpSa.exeCloudNotifications.exepid process 1232 phoneactivate.exe 2172 RdpSa.exe 4744 CloudNotifications.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lfrlnvcigtdv = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\FNU9DP~1\\RdpSa.exe" -
Processes:
rundll32.exephoneactivate.exeRdpSa.exeCloudNotifications.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CloudNotifications.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4140 rundll32.exe 4140 rundll32.exe 4140 rundll32.exe 4140 rundll32.exe 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3276 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3276 wrote to memory of 928 3276 phoneactivate.exe PID 3276 wrote to memory of 928 3276 phoneactivate.exe PID 3276 wrote to memory of 1232 3276 phoneactivate.exe PID 3276 wrote to memory of 1232 3276 phoneactivate.exe PID 3276 wrote to memory of 4880 3276 RdpSa.exe PID 3276 wrote to memory of 4880 3276 RdpSa.exe PID 3276 wrote to memory of 2172 3276 RdpSa.exe PID 3276 wrote to memory of 2172 3276 RdpSa.exe PID 3276 wrote to memory of 4456 3276 CloudNotifications.exe PID 3276 wrote to memory of 4456 3276 CloudNotifications.exe PID 3276 wrote to memory of 4744 3276 CloudNotifications.exe PID 3276 wrote to memory of 4744 3276 CloudNotifications.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7edf14bfa55dd4235c32177c4cba776_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵
-
C:\Users\Admin\AppData\Local\5IMF8F\phoneactivate.exeC:\Users\Admin\AppData\Local\5IMF8F\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵
-
C:\Users\Admin\AppData\Local\1Ebq\RdpSa.exeC:\Users\Admin\AppData\Local\1Ebq\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\CloudNotifications.exeC:\Windows\system32\CloudNotifications.exe1⤵
-
C:\Users\Admin\AppData\Local\TEo3u4Fp\CloudNotifications.exeC:\Users\Admin\AppData\Local\TEo3u4Fp\CloudNotifications.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1Ebq\RdpSa.exeFilesize
56KB
MD55992f5b5d0b296b83877da15b54dd1b4
SHA10d87be8d4b7aeada4b55d1d05c0539df892f8f82
SHA25632f60eabe54c4d0cd0f0ec29f48f55ca1ad097bf35097247b186fd70426f847c
SHA5124f6da913af530301da1d0638aa2635ada446ebee6e27b5059db5c2b7fe439162ac3b1a595ecf4163a093890df9ac94d9085a53d8c991e48703f9d2691326e7e6
-
C:\Users\Admin\AppData\Local\1Ebq\WINSTA.dllFilesize
876KB
MD575e0834b1ce86b3c3a288703321bfb14
SHA18dc368a64af2d3a5d0c875a9f963ba67f9345488
SHA25636a6abc7e17c88d337092a9b8579c9c4c28541f455d54f465b8e322b28c2de2b
SHA5128fa053a99e46505e0e2a9f4c8cdc48968f5d1facc139f7324560056806bc994ddd998f0cb91956fdb1b1755a53c22d51e4fb57eebfda4ca76896a79fbf020bef
-
C:\Users\Admin\AppData\Local\5IMF8F\DUI70.dllFilesize
1.1MB
MD5cfdd962558b78c1b045c9a72721ac6a4
SHA1a77f2a48f64620ade6428ce11123ac72daa8915c
SHA2561c2ffaa92bcb5ea6aa99d28cc6973a250504de89f90673849084c7dc27475d63
SHA512ee6fb3e40e03ffe5e898770eec4709f63c6615317461887157617c3cb2b074c1f0ad8e0ce8a2b2ddb386643967b680b83f9e2f6ebe496d7e9b560570bf12f8d5
-
C:\Users\Admin\AppData\Local\5IMF8F\phoneactivate.exeFilesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
C:\Users\Admin\AppData\Local\TEo3u4Fp\CloudNotifications.exeFilesize
59KB
MD5b50dca49bc77046b6f480db6444c3d06
SHA1cc9b38240b0335b1763badcceac37aa9ce547f9e
SHA25696e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775
SHA5122a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3
-
C:\Users\Admin\AppData\Local\TEo3u4Fp\UxTheme.dllFilesize
872KB
MD518f24988d889336dd5a4521b7684e99b
SHA1d9d023813c602b01c8558495add3865e34b0fda0
SHA25619c3cb86b1dd4e8bb9dea7921b82dfffb0f0798c0c9584f2acc60293d3c0170e
SHA5121e90118721858b8d3beaf16110affb820375c94d9eb904adb46fed019fae08a6979d57ae65328b0032afe092fccea6966b0ad9b6c1013b61b62f506037f11c25
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Fxdlif.lnkFilesize
1KB
MD5e536ef69e6d41419f5e5f96dc0630f6c
SHA19a9a3b85838f4c44f8536b131f69ba0b5ff0fe72
SHA256c243b7eb68edc77fdf9117945d4b758641002655432cec30a017af57961f3c48
SHA512bf1946c262476d3816e1b8bb20effedc2199f573b26af56283a6fbb8441bd6bc76a4846ac01a880f04ed6d371db50dde524aec8ba8e2a057f20cc2ff61ca57bc
-
memory/1232-57-0x00007FFA929C0000-0x00007FFA92ADF000-memory.dmpFilesize
1.1MB
-
memory/1232-52-0x000002ACBECE0000-0x000002ACBECE7000-memory.dmpFilesize
28KB
-
memory/1232-53-0x00007FFA929C0000-0x00007FFA92ADF000-memory.dmpFilesize
1.1MB
-
memory/2172-68-0x00007FFA92AA0000-0x00007FFA92B7B000-memory.dmpFilesize
876KB
-
memory/2172-70-0x000002E527D50000-0x000002E527D57000-memory.dmpFilesize
28KB
-
memory/2172-73-0x00007FFA92AA0000-0x00007FFA92B7B000-memory.dmpFilesize
876KB
-
memory/3276-13-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-16-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-15-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-19-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-17-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-20-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-21-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-22-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-24-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-23-0x00000000009D0000-0x00000000009D7000-memory.dmpFilesize
28KB
-
memory/3276-31-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-32-0x00007FFAB04A0000-0x00007FFAB04B0000-memory.dmpFilesize
64KB
-
memory/3276-33-0x00007FFAB0490000-0x00007FFAB04A0000-memory.dmpFilesize
64KB
-
memory/3276-42-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-3-0x0000000002820000-0x0000000002821000-memory.dmpFilesize
4KB
-
memory/3276-18-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-14-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-6-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-12-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-11-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-10-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-9-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-7-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/3276-8-0x00007FFAAFA8A000-0x00007FFAAFA8B000-memory.dmpFilesize
4KB
-
memory/3276-5-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/4140-0-0x00007FFAA22F0000-0x00007FFAA23C9000-memory.dmpFilesize
868KB
-
memory/4140-45-0x00007FFAA22F0000-0x00007FFAA23C9000-memory.dmpFilesize
868KB
-
memory/4140-2-0x0000027B6D340000-0x0000027B6D347000-memory.dmpFilesize
28KB
-
memory/4744-84-0x00007FFA92AA0000-0x00007FFA92B7A000-memory.dmpFilesize
872KB
-
memory/4744-86-0x0000023571A40000-0x0000023571A47000-memory.dmpFilesize
28KB
-
memory/4744-89-0x00007FFA92AA0000-0x00007FFA92B7A000-memory.dmpFilesize
872KB