Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
14424e927320cb758b2c314ebe1df889
-
SHA1
1f20dd2472d5684b850b991ce30714ecf8a3b9d1
-
SHA256
b23b7277f4aa14f76a34accc9c26a18714be7e1601ca8c19c195d0b8251cf96d
-
SHA512
717aa863b1935aec5e50025bc90aeb580f905b74019060ca3960f11c4ffe2a5f8ec1a2086ea8a19297696f68519b714cb4e94b53486b8b6fcd160e1076d04055
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3544-4-0x0000000002670000-0x0000000002671000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
PresentationHost.exesigverif.execttune.exepid process 3428 PresentationHost.exe 3228 sigverif.exe 920 cttune.exe -
Loads dropped DLL 3 IoCs
Processes:
PresentationHost.exesigverif.execttune.exepid process 3428 PresentationHost.exe 3228 sigverif.exe 920 cttune.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wuaobpzp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-3726321484-1950364574-433157660-1000\\03nzJxt5IdQ\\sigverif.exe" -
Processes:
rundll32.exePresentationHost.exesigverif.execttune.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cttune.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3484 rundll32.exe 3484 rundll32.exe 3484 rundll32.exe 3484 rundll32.exe 3484 rundll32.exe 3484 rundll32.exe 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 3544 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3544 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3544 wrote to memory of 1436 3544 PresentationHost.exe PID 3544 wrote to memory of 1436 3544 PresentationHost.exe PID 3544 wrote to memory of 3428 3544 PresentationHost.exe PID 3544 wrote to memory of 3428 3544 PresentationHost.exe PID 3544 wrote to memory of 4592 3544 sigverif.exe PID 3544 wrote to memory of 4592 3544 sigverif.exe PID 3544 wrote to memory of 3228 3544 sigverif.exe PID 3544 wrote to memory of 3228 3544 sigverif.exe PID 3544 wrote to memory of 2896 3544 cttune.exe PID 3544 wrote to memory of 2896 3544 cttune.exe PID 3544 wrote to memory of 920 3544 cttune.exe PID 3544 wrote to memory of 920 3544 cttune.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14424e927320cb758b2c314ebe1df889_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵
-
C:\Users\Admin\AppData\Local\ETZyuzI\PresentationHost.exeC:\Users\Admin\AppData\Local\ETZyuzI\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\j5pFM\sigverif.exeC:\Users\Admin\AppData\Local\j5pFM\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cttune.exeC:\Windows\system32\cttune.exe1⤵
-
C:\Users\Admin\AppData\Local\8Nog\cttune.exeC:\Users\Admin\AppData\Local\8Nog\cttune.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8Nog\OLEACC.dllFilesize
1.2MB
MD5eaf26032403b374f75ffa95247e72b5b
SHA1c100765426108dd0c756e64ea16c717f26094109
SHA25601031d41295775620ca30056f00e107b8fa1758a6b626a77756c18b8debd47ba
SHA51288e332dee2cec2dc0e31c2e94b58b7634a6315ad285bdd8d93e4d4c933eb535b8ce04eb199e4d5807fe89cc0ff09e8da6fdf1054d1072b89de2b757bca0f73db
-
C:\Users\Admin\AppData\Local\8Nog\cttune.exeFilesize
90KB
MD5fa924465a33833f41c1a39f6221ba460
SHA1801d505d81e49d2b4ffa316245ca69ff58c523c3
SHA256de2d871afe2c071cf305fc488875563b778e7279e57030ba1a1c9f7e360748da
SHA512eef91316e1a679cc2183d4fe9f8f40b5efa6d06f7d1246fd399292e14952053309b6891059da88134a184d9bd0298a45a1bf4bc9f27140b1a31b9523acbf3757
-
C:\Users\Admin\AppData\Local\ETZyuzI\PresentationHost.exeFilesize
276KB
MD5ef27d65b92d89e8175e6751a57ed9d93
SHA17279b58e711b459434f047e9098f9131391c3778
SHA25617d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
SHA51240f46c3a131bb0388b8a3f7aee422936f6e2aa8d2cda547c43c4e7979c163d06c5aa20033a5156d3eeee5d455eeb929cbce89bcc8bb1766cbb65d7f03dd23e2e
-
C:\Users\Admin\AppData\Local\ETZyuzI\VERSION.dllFilesize
1.2MB
MD57cfe9791804b4220b13a70f02f0e91f4
SHA1838629ce4c800b9b914acc8db59eeb68b60f80c7
SHA256d3dea9209554220114cb9f8a8c17ecbe2e7e9b36c29324f9cceb23b6a341cef2
SHA5128912b387dc52cf9add6c889d0abc482055ef51d1cdfe41111eb61aabcc6526085e2ad12b7927b03c181df616652354d5a6fdfc3c1e0e327e5d9f928e180a6bce
-
C:\Users\Admin\AppData\Local\j5pFM\VERSION.dllFilesize
1.2MB
MD5e3628355c20af112457ddbc248a3a843
SHA1d9da37bd312c185d03fa62b2305b70b08ae9a447
SHA256dcd771d076464514148e6e15962ff0d4824de581049eb3c4b2e5fc6b8f42d693
SHA512f763fd9a5c67bff4d5d2bc38f571e44f27dea6e0e4542db7372a00b66099a814bd80930aa9cee73aaf589ea1beea5d126e3f0afa838a7b227f51cb231be80e2b
-
C:\Users\Admin\AppData\Local\j5pFM\sigverif.exeFilesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Aibqacvbwgcfz.lnkFilesize
1KB
MD5d7e76f86270d9cb8adefeea66c8917e2
SHA1d9243b0e28e66ceaee446485db02c55df86d97fd
SHA256edc5109a7e2e49a9ea237640ad13977b9285f789d3aa7ed5c6cb7d1f87c5c067
SHA512579d27bae97a430891334c5bd4cb13443b9733ff5b41cdf341843b8dea2610cef3851ac6f9ccfec29ff65a016dd191633e6616d53a3323f409958be5a3a1b910
-
memory/920-86-0x00007FFC83070000-0x00007FFC831B2000-memory.dmpFilesize
1.3MB
-
memory/3228-70-0x00007FFC92220000-0x00007FFC92362000-memory.dmpFilesize
1.3MB
-
memory/3228-64-0x00007FFC92220000-0x00007FFC92362000-memory.dmpFilesize
1.3MB
-
memory/3228-67-0x00000219A48F0000-0x00000219A48F7000-memory.dmpFilesize
28KB
-
memory/3428-53-0x00007FFC83070000-0x00007FFC831B2000-memory.dmpFilesize
1.3MB
-
memory/3428-47-0x00007FFC83070000-0x00007FFC831B2000-memory.dmpFilesize
1.3MB
-
memory/3428-50-0x0000022DA3010000-0x0000022DA3017000-memory.dmpFilesize
28KB
-
memory/3484-40-0x00007FFC92220000-0x00007FFC92361000-memory.dmpFilesize
1.3MB
-
memory/3484-0-0x00007FFC92220000-0x00007FFC92361000-memory.dmpFilesize
1.3MB
-
memory/3484-3-0x000002C820040000-0x000002C820047000-memory.dmpFilesize
28KB
-
memory/3544-33-0x00007FFC9F62A000-0x00007FFC9F62B000-memory.dmpFilesize
4KB
-
memory/3544-14-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-37-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-7-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-8-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-9-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-10-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-11-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-12-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-6-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-15-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-17-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-34-0x0000000000C90000-0x0000000000C97000-memory.dmpFilesize
28KB
-
memory/3544-35-0x00007FFCA07B0000-0x00007FFCA07C0000-memory.dmpFilesize
64KB
-
memory/3544-25-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-16-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-13-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/3544-4-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB