Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
ff6cd31f07d94bb47ea90f53731a97ca_JaffaCakes118.dll
Resource
win7-20240215-en
General
-
Target
ff6cd31f07d94bb47ea90f53731a97ca_JaffaCakes118.dll
-
Size
1.9MB
-
MD5
ff6cd31f07d94bb47ea90f53731a97ca
-
SHA1
254860df90ab5c6c2e7d8faba7ef4df7e085f3bd
-
SHA256
51676b3254a014834afdaba33bdff2911b7d87613f0f23201ba14f9d78e2cf99
-
SHA512
f8eb53555945d2b56030ad281dd04e861ff3183008dd18870ac7fe9623ef76b0679b129e2c925e4bb325675e3467194e888e8079e199df193d9e3974ded25f05
-
SSDEEP
12288:EVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:hfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3500-4-0x00000000025E0000-0x00000000025E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exemsconfig.exeBdeUISrv.exepid process 3956 SystemPropertiesDataExecutionPrevention.exe 1336 msconfig.exe 3192 BdeUISrv.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesDataExecutionPrevention.exemsconfig.exeBdeUISrv.exepid process 3956 SystemPropertiesDataExecutionPrevention.exe 1336 msconfig.exe 3192 BdeUISrv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yqyvrmzmpvckvj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\UProof\\KY824RK9Wp5\\msconfig.exe" -
Processes:
rundll32.exeSystemPropertiesDataExecutionPrevention.exemsconfig.exeBdeUISrv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 3500 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3500 wrote to memory of 5060 3500 SystemPropertiesDataExecutionPrevention.exe PID 3500 wrote to memory of 5060 3500 SystemPropertiesDataExecutionPrevention.exe PID 3500 wrote to memory of 3956 3500 SystemPropertiesDataExecutionPrevention.exe PID 3500 wrote to memory of 3956 3500 SystemPropertiesDataExecutionPrevention.exe PID 3500 wrote to memory of 5032 3500 msconfig.exe PID 3500 wrote to memory of 5032 3500 msconfig.exe PID 3500 wrote to memory of 1336 3500 msconfig.exe PID 3500 wrote to memory of 1336 3500 msconfig.exe PID 3500 wrote to memory of 2008 3500 BdeUISrv.exe PID 3500 wrote to memory of 2008 3500 BdeUISrv.exe PID 3500 wrote to memory of 3192 3500 BdeUISrv.exe PID 3500 wrote to memory of 3192 3500 BdeUISrv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff6cd31f07d94bb47ea90f53731a97ca_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵
-
C:\Users\Admin\AppData\Local\NvuFqRBip\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\NvuFqRBip\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵
-
C:\Users\Admin\AppData\Local\Dy1g1OLi6\msconfig.exeC:\Users\Admin\AppData\Local\Dy1g1OLi6\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵
-
C:\Users\Admin\AppData\Local\2y6PRowQ\BdeUISrv.exeC:\Users\Admin\AppData\Local\2y6PRowQ\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2y6PRowQ\BdeUISrv.exeFilesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
C:\Users\Admin\AppData\Local\2y6PRowQ\WTSAPI32.dllFilesize
1.9MB
MD5732e495dda5676f15b15067ef59f4abd
SHA17e4cb39fff5579978a6154e170d8126e5af289c5
SHA256456d5e7fba75f8d88de9afab25bf43d7bf4c09d6481a932e7d219e908133ace4
SHA51281a18858f6a2f1fb781e9c4239b369dc95741d2e57689477e6a80f7c81a7bf45b5d580acc72f5d06d99ed31f3476123a6a880e9daef852f1cd97dbdf0043d55b
-
C:\Users\Admin\AppData\Local\Dy1g1OLi6\VERSION.dllFilesize
1.9MB
MD57423031fa3489372a5218fb8fc4dcbe1
SHA1e1b7bc0620e401d16d0c92c8675e01affd7ca8a3
SHA2566856ea53ea2d226a6d8351ce15707b6516f3425922fd395d430665c271cd1a82
SHA51270d61e1f381219086d275a32e95cb2c5527f3e8765f69e92b491d140d1227c27ceffceb3dc47a62843faf88be3b9d2e940a6c72b619021aadc686c95d2f7f84b
-
C:\Users\Admin\AppData\Local\Dy1g1OLi6\msconfig.exeFilesize
193KB
MD539009536cafe30c6ef2501fe46c9df5e
SHA16ff7b4d30f31186de899665c704a105227704b72
SHA25693d2604f7fdf7f014ac5bef63ab177b6107f3cfc26da6cbd9a7ab50c96564a04
SHA51295c9a8bc61c79108634f5578825544323e3d980ae97a105a325c58bc0e44b1d500637459969602f08d6d23d346baec6acd07d8351803981000c797190d48f03a
-
C:\Users\Admin\AppData\Local\NvuFqRBip\SYSDM.CPLFilesize
1.9MB
MD58e529d0507f933d85d6e1f3c22300894
SHA178c8350891c2fd4af0af06fc4d42af81b22cb835
SHA256877f0feebcba12ce3283fb3acae87c1d95d420588fed12742a8882e824c912ec
SHA51274297de3c8383c6a6c650bd5969ada674138cf3bb0fd1974d9f3c34441a3d1b309280304f123dca9840f048dcf8291587fd2039a529f0571071d68569971c952
-
C:\Users\Admin\AppData\Local\NvuFqRBip\SystemPropertiesDataExecutionPrevention.exeFilesize
82KB
MD5de58532954c2704f2b2309ffc320651d
SHA10a9fc98f4d47dccb0b231edf9a63309314f68e3b
SHA2561f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3
SHA512d4d57cc30d9079f4e9193ba42631e8e53d86b22e9c655d7a8c25e5be0e5e1d6dfff4714ddc23e3e392809d623b4f8d43c63893f74c325fc77459ac03c7a451ed
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Qbfswxgeo.lnkFilesize
1KB
MD5e3d5136818e643039ee231bf1f5a1a3d
SHA1390b8ad58ce3aad741ea43426f480840511d8d65
SHA2562089cb4af41e4f9e2f2acedac445364430bb11c33559495ba9b88e647f687da4
SHA5122a00f254d07cf02267d92b40e45cfee98c50dd2242c2e03b9defd2020995636f59616820ea992556f6521cb090e7e4bf3929a15d20138eaa5ee7c3ff293fbbbf
-
memory/1336-82-0x0000026D4EFE0000-0x0000026D4EFE7000-memory.dmpFilesize
28KB
-
memory/1336-86-0x0000000140000000-0x00000001401E2000-memory.dmpFilesize
1.9MB
-
memory/2516-7-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/2516-1-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/2516-0-0x0000023FF95A0000-0x0000023FF95A7000-memory.dmpFilesize
28KB
-
memory/3192-97-0x000001F35B8B0000-0x000001F35B8B7000-memory.dmpFilesize
28KB
-
memory/3192-103-0x0000000140000000-0x00000001401E2000-memory.dmpFilesize
1.9MB
-
memory/3500-28-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-42-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-20-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-21-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-19-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-22-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-23-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-24-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-26-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-27-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-17-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-30-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-31-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-29-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-25-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-32-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-33-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-35-0x00000000006B0000-0x00000000006B7000-memory.dmpFilesize
28KB
-
memory/3500-34-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-18-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-43-0x00007FFFBF720000-0x00007FFFBF730000-memory.dmpFilesize
64KB
-
memory/3500-52-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-54-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-16-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-15-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-4-0x00000000025E0000-0x00000000025E1000-memory.dmpFilesize
4KB
-
memory/3500-8-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-10-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-14-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-13-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-6-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-9-0x00007FFFBE8EA000-0x00007FFFBE8EB000-memory.dmpFilesize
4KB
-
memory/3500-12-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3500-11-0x0000000140000000-0x00000001401E1000-memory.dmpFilesize
1.9MB
-
memory/3956-69-0x0000000140000000-0x00000001401E2000-memory.dmpFilesize
1.9MB
-
memory/3956-64-0x0000020664C30000-0x0000020664C37000-memory.dmpFilesize
28KB
-
memory/3956-63-0x0000000140000000-0x00000001401E2000-memory.dmpFilesize
1.9MB