Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
12c053b6a3b757d92ee5f63164376485_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
12c053b6a3b757d92ee5f63164376485_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
12c053b6a3b757d92ee5f63164376485
-
SHA1
1a8139740f376f7f328ca8f253a2e3febf637f5e
-
SHA256
d7f0e30e4f02bdda1c4bc20ab34b51529ca36fa239a19de5b608ba284c77945c
-
SHA512
bf4e5fb030353a18052d3873dcef9e5f204323669ef79c070892f6b2b7e5a5db03bd23910dc74b28e9fe6815e6c8403b28611e39e3882e4acdcb868c63e87b53
-
SSDEEP
24576:FVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:FV8hf6STw1ZlQauvzSq01ICe6zvm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3428-4-0x00000000030D0000-0x00000000030D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wusa.exesigverif.exepsr.exepid process 2156 wusa.exe 2040 sigverif.exe 4864 psr.exe -
Loads dropped DLL 3 IoCs
Processes:
wusa.exesigverif.exepsr.exepid process 2156 wusa.exe 2040 sigverif.exe 4864 psr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Minhbfns = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\C9gCBSSvc\\sigverif.exe" -
Processes:
rundll32.exewusa.exesigverif.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3864 rundll32.exe 3864 rundll32.exe 3864 rundll32.exe 3864 rundll32.exe 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 3428 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3428 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3428 wrote to memory of 4792 3428 wusa.exe PID 3428 wrote to memory of 4792 3428 wusa.exe PID 3428 wrote to memory of 2156 3428 wusa.exe PID 3428 wrote to memory of 2156 3428 wusa.exe PID 3428 wrote to memory of 3532 3428 sigverif.exe PID 3428 wrote to memory of 3532 3428 sigverif.exe PID 3428 wrote to memory of 2040 3428 sigverif.exe PID 3428 wrote to memory of 2040 3428 sigverif.exe PID 3428 wrote to memory of 1348 3428 psr.exe PID 3428 wrote to memory of 1348 3428 psr.exe PID 3428 wrote to memory of 4864 3428 psr.exe PID 3428 wrote to memory of 4864 3428 psr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12c053b6a3b757d92ee5f63164376485_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵
-
C:\Users\Admin\AppData\Local\22D34W\wusa.exeC:\Users\Admin\AppData\Local\22D34W\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\0SajlNyJ\sigverif.exeC:\Users\Admin\AppData\Local\0SajlNyJ\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\1lSb9\psr.exeC:\Users\Admin\AppData\Local\1lSb9\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0SajlNyJ\VERSION.dllFilesize
1.2MB
MD533bbeee4acee90e1b95161e6166d0a8f
SHA138d2d7dd49ad753762baf55cc50210ada6544350
SHA2561433a48d434dea6081723ad016fbff3581348978ad74b7695524705b64710f2a
SHA512eefa1aca6e59a64f79d398cbf13f19b0a64ad0206d86b5f48e3e45e0aa49bfe3b0e94dbcff46fb12f6fdbc72ab13666a15460d577efc53f0d8a42f6b444e9bf5
-
C:\Users\Admin\AppData\Local\0SajlNyJ\sigverif.exeFilesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
C:\Users\Admin\AppData\Local\1lSb9\XmlLite.dllFilesize
1.2MB
MD5fdee8388d9cd87649f48984a3031b899
SHA1d3c98fca65ed77c12d8bcddd43863eec2e87caec
SHA2568b865155c520e384cce803110edb69930cb0bca582ac278539aca1b5e027c0f7
SHA512000e8d05b98f6e729d0851bf5b09875074a53e629e60ad10694cf1004fbe2751e3e84d1ef2b7f57826c205db015285fd8f0096d3f5969cf7d10c94811935c709
-
C:\Users\Admin\AppData\Local\1lSb9\psr.exeFilesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
C:\Users\Admin\AppData\Local\22D34W\dpx.dllFilesize
1.2MB
MD503eeb101454e583a39099cb8c899e52a
SHA1452f95aba812e1ff730846e88f9e724188c5ea83
SHA256dcd40424b719eabd5fb8842076cccc273ed51c7ad2c7fecc80942d1b829df4de
SHA512543d94d7d4b0bb81ace7c444e3156b03b66e75470684596e7d0fbd8faf02afe3e8c2713ef20fa47470d0e9837006e08b142610ec4698fc16132f5013564c6926
-
C:\Users\Admin\AppData\Local\22D34W\wusa.exeFilesize
309KB
MD5e43499ee2b4cf328a81bace9b1644c5d
SHA1b2b55641f2799e3fdb3bea709c9532017bbac59d
SHA2563e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb
SHA51204823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rnysjhcczxaxza.lnkFilesize
1KB
MD5058cd1d9720c5b5c48bcff6f9ad5f0a9
SHA10dfee552db272415ea84d559d53cfd1507056b61
SHA2566b2328e6a0358679f988aa25f02045d675d43f23994a9e2f6a7a40a2c44c1ea3
SHA512105f865d2d078db4ec9b8a9cf992d386580e4a169c187077532b6f908425cd45238aeb0353461601e109572ebd7d8c10bf20fd7270cde1c2eb907f6ee3345ee4
-
memory/2040-68-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2040-62-0x0000024DBAE70000-0x0000024DBAE77000-memory.dmpFilesize
28KB
-
memory/2156-51-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2156-45-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB
-
memory/2156-48-0x0000012A5B290000-0x0000012A5B297000-memory.dmpFilesize
28KB
-
memory/3428-28-0x00000000010B0000-0x00000000010B7000-memory.dmpFilesize
28KB
-
memory/3428-14-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-9-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-8-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-35-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-6-0x00007FFCB039A000-0x00007FFCB039B000-memory.dmpFilesize
4KB
-
memory/3428-11-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-12-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-13-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-15-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-7-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-29-0x00007FFCB1930000-0x00007FFCB1940000-memory.dmpFilesize
64KB
-
memory/3428-24-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-10-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3428-4-0x00000000030D0000-0x00000000030D1000-memory.dmpFilesize
4KB
-
memory/3864-1-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3864-38-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3864-3-0x0000014E7C0F0000-0x0000014E7C0F7000-memory.dmpFilesize
28KB
-
memory/4864-82-0x000001C518930000-0x000001C518937000-memory.dmpFilesize
28KB
-
memory/4864-85-0x0000000140000000-0x0000000140143000-memory.dmpFilesize
1.3MB