Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
0e60f420fdf85dd1b7fbaea84e647693
-
SHA1
e8aabce04be2e42aaf0235e7ab5f2b354ea727bb
-
SHA256
fb7040dce4fffb1394723ad25f6c9d088db9340cd2aed96b972f476693788f9a
-
SHA512
505fca3bcc20f0a9c16e566cccb6a8d1ab1949d7f5f4dd10bbf019e99b119d57947245b6a3dfe779c63636b4dfceaaf83a49efa40f832d57515097e6fca3cb4c
-
SSDEEP
24576:SuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:69cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3496-4-0x0000000002640000-0x0000000002641000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DWWIN.EXEphoneactivate.exeshrpubw.exepid process 3532 DWWIN.EXE 4032 phoneactivate.exe 3352 shrpubw.exe -
Loads dropped DLL 3 IoCs
Processes:
DWWIN.EXEphoneactivate.exeshrpubw.exepid process 3532 DWWIN.EXE 4032 phoneactivate.exe 3352 shrpubw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ramyketlbwvbqf = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\OC5THIs\\PHONEA~1.EXE" -
Processes:
rundll32.exeDWWIN.EXEphoneactivate.exeshrpubw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 3496 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3496 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3496 wrote to memory of 2908 3496 DWWIN.EXE PID 3496 wrote to memory of 2908 3496 DWWIN.EXE PID 3496 wrote to memory of 3532 3496 DWWIN.EXE PID 3496 wrote to memory of 3532 3496 DWWIN.EXE PID 3496 wrote to memory of 4296 3496 phoneactivate.exe PID 3496 wrote to memory of 4296 3496 phoneactivate.exe PID 3496 wrote to memory of 4032 3496 phoneactivate.exe PID 3496 wrote to memory of 4032 3496 phoneactivate.exe PID 3496 wrote to memory of 2804 3496 shrpubw.exe PID 3496 wrote to memory of 2804 3496 shrpubw.exe PID 3496 wrote to memory of 3352 3496 shrpubw.exe PID 3496 wrote to memory of 3352 3496 shrpubw.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e60f420fdf85dd1b7fbaea84e647693_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:2908
-
C:\Users\Admin\AppData\Local\0tmzV7b\DWWIN.EXEC:\Users\Admin\AppData\Local\0tmzV7b\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3532
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:4296
-
C:\Users\Admin\AppData\Local\p6yOS\phoneactivate.exeC:\Users\Admin\AppData\Local\p6yOS\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4032
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:2804
-
C:\Users\Admin\AppData\Local\XGe\shrpubw.exeC:\Users\Admin\AppData\Local\XGe\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5444cc4d3422a0fdd45c1b78070026c60
SHA197162ff341fff1ec54b827ec02f8b86fd2d41a97
SHA2564b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0
SHA51221742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553
-
Filesize
1.2MB
MD56251f7510550721effebf16b39d5e6ff
SHA1d64166fad07db549b3beb3b1e9ba1f7704b7d372
SHA2564d6beb42dd30b64a374150348a37cf58a1712d7678df9ba1c3cd1de276b8862f
SHA512979e2f7535444b1887ae077e892c4db25ce331b5b2cfffb4db09a65ac6fc3378bfb08b1ec243fc5c379046226c4efe6db47c205ddc1ed219bcb83088492292e4
-
Filesize
1.2MB
MD58836a08ea286744b2eaccda25a612485
SHA15da9c27b15af83e483578e06eebbd95adc26da07
SHA2562ac84b824084a577d0e2793184d7508200384db602c8381dc0e1df8a052e7bce
SHA5121441778e548fef03d68a5485e653af4d664aa6d813325eae389325f197ffb77ad6fa7d23291af023d14c7f3b224b9536ce5f5f12cec8e29c1db0ccf39ca3f12b
-
Filesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
Filesize
1.2MB
MD5033b071355693b696fb9baaf3dfc229e
SHA11d494c7b43a3ad79095fa9636b81b535ea301916
SHA256191235550dd3ed197f0086037a022cc30501a6888f3e07c29e4e507e4fe27fb3
SHA512bffd13c178a1a2e5dea84962a43378743cea25252419d062ff87903fedb6a5b06fc4bd0240e709ee8c9da1f82411f7c248ffd29772cee348aa81486938a1eb36
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
1KB
MD5cb4ecabc78483de182ab8df782b0b9cd
SHA1d757bcf3fd52e1951f313111acfab1ec96e58b01
SHA256bc93d5132d0df03abf8e264e9e0c3390daafaf0b3831b6a6d94722920182bc23
SHA51240056f07fb7bf2852df3c4c1c71a5e5754327bf285a359948e64ca5c29f03718935e285334c63f5a4d093137cc6007e52272200818c5f676d71465f197352c10