Analysis
-
max time kernel
120s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll
-
Size
2.0MB
-
MD5
fc4b33a58a3e5a3d9e79c705f1c4684b
-
SHA1
7e51a8e6a888eef2018cf6877f715ef75e3f4edb
-
SHA256
339daa6caefda7397da9e0e67e855cacb27afed32537c22bd975e3352f340513
-
SHA512
f2ae2697d3b2def9b98fc1a1a9dfe9522befc6b53b477b851f846ac089ea73a354fa9012e4236856608f725d8b18728a2e16d3bdfdbc2007d78443ecb8dbe8fe
-
SSDEEP
12288:MVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:5fP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3356-4-0x00000000010A0000-0x00000000010A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
Narrator.exeSystemPropertiesPerformance.exeAgentService.exedwm.exepid process 4136 Narrator.exe 3204 SystemPropertiesPerformance.exe 2776 AgentService.exe 4456 dwm.exe -
Loads dropped DLL 6 IoCs
Processes:
SystemPropertiesPerformance.exeAgentService.exedwm.exepid process 3204 SystemPropertiesPerformance.exe 2776 AgentService.exe 4456 dwm.exe 4456 dwm.exe 4456 dwm.exe 4456 dwm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xcdbzlxvqxxhz = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\CloudStore\\r4UAZOtEx5o\\AgentService.exe" -
Processes:
SystemPropertiesPerformance.exeAgentService.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AgentService.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 2436 regsvr32.exe 2436 regsvr32.exe 2436 regsvr32.exe 2436 regsvr32.exe 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
description pid process target process PID 3356 wrote to memory of 2184 3356 Narrator.exe PID 3356 wrote to memory of 2184 3356 Narrator.exe PID 3356 wrote to memory of 5020 3356 SystemPropertiesPerformance.exe PID 3356 wrote to memory of 5020 3356 SystemPropertiesPerformance.exe PID 3356 wrote to memory of 3204 3356 SystemPropertiesPerformance.exe PID 3356 wrote to memory of 3204 3356 SystemPropertiesPerformance.exe PID 3356 wrote to memory of 4360 3356 AgentService.exe PID 3356 wrote to memory of 4360 3356 AgentService.exe PID 3356 wrote to memory of 2776 3356 AgentService.exe PID 3356 wrote to memory of 2776 3356 AgentService.exe PID 3356 wrote to memory of 3576 3356 dwm.exe PID 3356 wrote to memory of 3576 3356 dwm.exe PID 3356 wrote to memory of 4456 3356 dwm.exe PID 3356 wrote to memory of 4456 3356 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fc4b33a58a3e5a3d9e79c705f1c4684b_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
C:\Windows\system32\Narrator.exeC:\Windows\system32\Narrator.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Local\F8MFBoD\Narrator.exeC:\Users\Admin\AppData\Local\F8MFBoD\Narrator.exe1⤵
- Executes dropped EXE
PID:4136
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:5020
-
C:\Users\Admin\AppData\Local\AA8IiAo3W\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\AA8IiAo3W\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3204
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:4360
-
C:\Users\Admin\AppData\Local\qoJdw\AgentService.exeC:\Users\Admin\AppData\Local\qoJdw\AgentService.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2776
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:3576
-
C:\Users\Admin\AppData\Local\O2f0Q\dwm.exeC:\Users\Admin\AppData\Local\O2f0Q\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e6df52a2bdb4a4c13fd83aacb5444b6b
SHA1f0ad1605b819fe77e72c3238215dab6f20f9892f
SHA2569979ab6405536bcfd1a0491134d829cdf43d26d79d838741fc53b0cdc4bd9147
SHA51247377946616956985499ff15e33a6f07827b4ae8672da10b3ebc6f608d4688397809197054e4e20e5d26a65a1a58eaeddd1cba99e484033de02780ef80568470
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
521KB
MD5d92defaa4d346278480d2780325d8d18
SHA16494d55b2e5064ffe8add579edfcd13c3e69fffe
SHA25669b8c93d9b262b36e2bdc223cc0d6e312cc471b49d7cc36befbba1f863a05d83
SHA512b82c0fbc07361e4ad6e4ab171e55e1e41e9312ba995dce90696ca90f734f5d1ea11371ca046e8680ea566a1c2e0643ab86f1f6dcf6cbd05aed8448425a2830b5
-
Filesize
92KB
MD55c27608411832c5b39ba04e33d53536c
SHA1f92f8b7439ce1de4c297046ed1d3ff9f20bc97af
SHA2560ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565
SHA5121fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309
-
Filesize
2.0MB
MD52437c57ffe11802f7c69b0bc73f1ed97
SHA14b4e0fe448bd7706d6d7728dffb14e36df2ab041
SHA25673e64a85f603319351cb7fad6186db2069375bf800aba8decb306c84f26a3292
SHA512ecf5098f07b556f4da7082fac497e748560ad39d0a2e07e0eff6b0a3027f5327baa54c7bf92c2548f8d42abc7071f0e3f532ee831c8aff7c06e21cdadbad74f2
-
Filesize
2.0MB
MD5f7ead90fe4a32e9f4c39fb85a5ddbc89
SHA13d21482382a1ae0e2dee9c436f1b0a99dea1a4b6
SHA256bc20498a887a1bcdf678eed33feecd3fdbec354d7dc3d0d541a75c70caa30af1
SHA5125b226b45688109a8f6d0369f9757f284055db6bd2bf23bf68c5ad7d4859c38f8654d663dfc58287f61bb27edac5468cc0a85f26592f1b848116f06f151283450
-
Filesize
1.2MB
MD5f8bac206def3e87ceb8ef3cb0fb5a194
SHA1a28ea816e7b5ca511da4576262a5887a75171276
SHA256c69e4520d5dd84a409c2df1825ba30ec367400e4f7b001c8e971da8bef1a2268
SHA5128df9a814c738e79492a3b72ba359bf3aedfb89fe02215ef58e743c541a2194ba47e227969d76c55387eee6eb367ca68e4b3cdf054022cb86e62376cc2fdef909
-
Filesize
1KB
MD582867539cc718efd7abf51af475926a4
SHA1a71a04702a7a4ed9b27a4748edeb24dcf301a1d0
SHA256a8bbc806cee2e58589d6b0b2ed5c361fedf9929682074652d46c59c3fb5a32a7
SHA512d03aa50e022b0419924ef7f25306505e09b2af73c682ea03fc6c41e42d1a4df5be4d8bc8fbaed63c40548ab0cc99585611e11a4157b3fd2cc188c89b33654f74